Information Security Management最新文献

筛选
英文 中文
HIPAA201: A Framework Approach to HIPAA Security Readiness HIPAA201: HIPAA安全准备的框架方法
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-54
David MacLeod, Brian T. Geffert, David Deckter
{"title":"HIPAA201: A Framework Approach to HIPAA Security Readiness","authors":"David MacLeod, Brian T. Geffert, David Deckter","doi":"10.1201/9781351073547-54","DOIUrl":"https://doi.org/10.1201/9781351073547-54","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Work with a Managed Security Service Provider 如何与托管安全服务提供商合作
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-26
Laurie Hill McQuillan
{"title":"How to Work with a Managed Security Service Provider","authors":"Laurie Hill McQuillan","doi":"10.1201/9781351073547-26","DOIUrl":"https://doi.org/10.1201/9781351073547-26","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Protection: Organization, Roles, and Separation of Duties 信息保护:组织、角色和职责分离
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-29
R. Herold
{"title":"Information Protection: Organization, Roles, and Separation of Duties","authors":"R. Herold","doi":"10.1201/9781351073547-29","DOIUrl":"https://doi.org/10.1201/9781351073547-29","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The International Dimensions of Cyber-Crime 网络犯罪的国际层面
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-55
Ed Gabrys
{"title":"The International Dimensions of Cyber-Crime","authors":"Ed Gabrys","doi":"10.1201/9781351073547-55","DOIUrl":"https://doi.org/10.1201/9781351073547-55","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133934708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controlling Ftp: Providing Secured Data Transfers 控制Ftp:提供安全的数据传输
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-3
Hare Chris
{"title":"Controlling Ftp: Providing Secured Data Transfers","authors":"Hare Chris","doi":"10.1201/9781351073547-3","DOIUrl":"https://doi.org/10.1201/9781351073547-3","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hash Algorithms: From Message Digests to Signatures 哈希算法:从消息摘要到签名
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-41
Keith Pasley
{"title":"Hash Algorithms: From Message Digests to Signatures","authors":"Keith Pasley","doi":"10.1201/9781351073547-41","DOIUrl":"https://doi.org/10.1201/9781351073547-41","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrime: Response, Investigation, and Prosecution 网络犯罪:回应、调查和起诉
Information Security Management Pub Date : 2019-08-08 DOI: 10.1081/E-EIA-120046829
Thomas Akin
{"title":"Cybercrime: Response, Investigation, and Prosecution","authors":"Thomas Akin","doi":"10.1081/E-EIA-120046829","DOIUrl":"https://doi.org/10.1081/E-EIA-120046829","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Organizing for Success: Some Human Resources Issues in Information Security 组织成功:信息安全中的一些人力资源问题
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-30
Jeffrey H. Fenton, James M. Wolfe
{"title":"Organizing for Success: Some Human Resources Issues in Information Security","authors":"Jeffrey H. Fenton, James M. Wolfe","doi":"10.1201/9781351073547-30","DOIUrl":"https://doi.org/10.1201/9781351073547-30","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISPs and Denial-of-Service Attacks isp和拒绝服务攻击
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-17
K. Namyanaswamy
{"title":"ISPs and Denial-of-Service Attacks","authors":"K. Namyanaswamy","doi":"10.1201/9781351073547-17","DOIUrl":"https://doi.org/10.1201/9781351073547-17","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116157110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It Is All about Control 一切都是关于控制
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-2
Hare Chris
{"title":"It Is All about Control","authors":"Hare Chris","doi":"10.1201/9781351073547-2","DOIUrl":"https://doi.org/10.1201/9781351073547-2","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信