Information Security Management最新文献

筛选
英文 中文
The Security Policy Life Cycle: Functions and Responsibilities 安全策略生命周期:功能和职责
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-22
Patrick D. Howard
{"title":"The Security Policy Life Cycle: Functions and Responsibilities","authors":"Patrick D. Howard","doi":"10.1201/9781351073547-22","DOIUrl":"https://doi.org/10.1201/9781351073547-22","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directory Security 目录安全性
Information Security Management Pub Date : 2019-08-08 DOI: 10.1081/E-EIA-120046768
Ken Buszta
{"title":"Directory Security","authors":"Ken Buszta","doi":"10.1081/E-EIA-120046768","DOIUrl":"https://doi.org/10.1081/E-EIA-120046768","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packet Sniffers: Use and Misuse 包嗅探器:使用和误用
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-16
Steve A. Rodgers
{"title":"Packet Sniffers: Use and Misuse","authors":"Steve A. Rodgers","doi":"10.1201/9781351073547-16","DOIUrl":"https://doi.org/10.1201/9781351073547-16","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ownership and Custody of Data 数据的所有权和保管
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781420072419.ch28
William Hugh Murray
{"title":"Ownership and Custody of Data","authors":"William Hugh Murray","doi":"10.1201/9781420072419.ch28","DOIUrl":"https://doi.org/10.1201/9781420072419.ch28","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Management 安全管理
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-20
Ken Buszta
{"title":"Security Management","authors":"Ken Buszta","doi":"10.1201/9781351073547-20","DOIUrl":"https://doi.org/10.1201/9781351073547-20","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Security App 保护
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-33
Walter S. Kobus
{"title":"Application Security","authors":"Walter S. Kobus","doi":"10.1201/9781351073547-33","DOIUrl":"https://doi.org/10.1201/9781351073547-33","url":null,"abstract":"This project is due on Thursday, September 19, 2019 at 10 PM. You must work in teams of two and submit one project per team. You will have a budget of five late days (24-hour periods) over the course of the semester that you can use to turn assignments in late without penalty and without needing to ask for an extension. You may use a maximum of two late days per assignment. Late pair projects will be charged to both partners. Once your late days are used up, extensions will only be granted in extraordinary circumstances.","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking News: The Latest Hacker Attacks and Defenses 突发新闻:最新的黑客攻击和防御
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-5
Skoudis Edward
{"title":"Breaking News: The Latest Hacker Attacks and Defenses","authors":"Skoudis Edward","doi":"10.1201/9781351073547-5","DOIUrl":"https://doi.org/10.1201/9781351073547-5","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What’s Not So Simple about SNMP? SNMP为什么不简单?
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-8
Hare Chris
{"title":"What’s Not So Simple about SNMP?","authors":"Hare Chris","doi":"10.1201/9781351073547-8","DOIUrl":"https://doi.org/10.1201/9781351073547-8","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127442420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Case for Privacy 隐私权的案例
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-4
M. Corby
{"title":"The Case for Privacy","authors":"M. Corby","doi":"10.1201/9781351073547-4","DOIUrl":"https://doi.org/10.1201/9781351073547-4","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Security: The Threat after September 11 物理安全:911事件后的威胁
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-63
Jaymes Williams
{"title":"Physical Security: The Threat after September 11","authors":"Jaymes Williams","doi":"10.1201/9781351073547-63","DOIUrl":"https://doi.org/10.1201/9781351073547-63","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信