[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Dave Blackshaw, 2012 - Google Patents

Information Security-Glossary

Dave Blackshaw, 2012

View PDF
Document ID
13791511688793733417
Author
Dave Blackshaw I
Publication year

External Links

Snippet

Information Security Management has evolved into a strict discipline within the industry and, as such, has grown a vocabulary of its own. This document serves as a guide to the official terminology and acronyms–used in industry standards such as the ISO 27000 framework …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Alharbi Dealing with Data Breaches Amidst Changes In Technology.
Butt et al. Cyber threat ransomware and marketing to networked consumers
Alsmadi et al. Practical information security
Taherdoost E-Business Security and Control
Belmabrouk Cyber criminals and data privacy measures
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Iordache Database–Web Interface Vulnerabilities
O’Regan Computer Crime
Gordon et al. Cybersecurity & the Courthouse: safeguarding the judicial process
Bowerman et al. Cybersecurity Threats and
Yakubdjanovna et al. Analysis of Information Security Problems in Electronic Management with Possible Solutions
Beretas Information Systems Security, Detection and Recovery from Cyber Attacks
Dave Blackshaw Information Security-Glossary
Jariwala The Cyber Security Roadmap A Comprehensive Guide to Cyber Threats, Cyber Laws, and Cyber Security Training for a Safer Digital World
Isaac et al. AI Product Security: A Primer for Developers
Pandya et al. Review on Cybersecurity and Techniques
Süß et al. Data Center Security and Resiliency
Chaka et al. Curtailing the threats to cloud computing in the fourth industrial revolution
Salim et al. A Literature Review of Challenges and Solutions in Cloud Security
Арустамов et al. Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие
Washington Software Supply Chain Attacks
Muteswa Cyber security insights for individuals, governments & organizations (gathered articles): a North America, Asia, Africa, South America, Oceania & Europe perspective
Kaushal et al. Cyber Security Techniques Architecture and Design: Cyber-Attacks Detection and Prevention