Information Security Management最新文献

筛选
英文 中文
Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards 评估信息技术环境的安全态势:平衡风险、成本和评估安全措施频率的挑战
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781420072419.ch21
R. Brian
{"title":"Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards","authors":"R. Brian","doi":"10.1201/9781420072419.ch21","DOIUrl":"https://doi.org/10.1201/9781420072419.ch21","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Considerations for Outsourcing Security 外判保安的考虑
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9780203325438.ch105
J. Michael
{"title":"Considerations for Outsourcing Security","authors":"J. Michael","doi":"10.1201/9780203325438.ch105","DOIUrl":"https://doi.org/10.1201/9780203325438.ch105","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123570257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident Response Management 事件响应管理
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-57
Alan B. Sterneckert
{"title":"Incident Response Management","authors":"Alan B. Sterneckert","doi":"10.1201/9781351073547-57","DOIUrl":"https://doi.org/10.1201/9781351073547-57","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overcoming Wireless LAN Security Vulnerabilities 克服无线局域网安全漏洞
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-13
Gilbert Held
{"title":"Overcoming Wireless LAN Security Vulnerabilities","authors":"Gilbert Held","doi":"10.1201/9781351073547-13","DOIUrl":"https://doi.org/10.1201/9781351073547-13","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127326188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Continuity Planning: A Collaborative Approach 业务连续性计划:协作方法
Information Security Management Pub Date : 2019-08-08 DOI: 10.1201/9781351073547-51
Kevin Henry
{"title":"Business Continuity Planning: A Collaborative Approach","authors":"Kevin Henry","doi":"10.1201/9781351073547-51","DOIUrl":"https://doi.org/10.1201/9781351073547-51","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"81 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133124387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware and Computer Viruses 恶意软件及电脑病毒
Information Security Management Pub Date : 2000-10-20 DOI: 10.1201/9780203325438.CH128
Robert M. Slade
{"title":"Malware and Computer Viruses","authors":"Robert M. Slade","doi":"10.1201/9780203325438.CH128","DOIUrl":"https://doi.org/10.1201/9780203325438.CH128","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"789 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126620273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reporting Security Breaches 报告安全漏洞
Information Security Management Pub Date : 2000-10-20 DOI: 10.1201/9780203325438.ch187
J. Tiller
{"title":"Reporting Security Breaches","authors":"J. Tiller","doi":"10.1201/9780203325438.ch187","DOIUrl":"https://doi.org/10.1201/9780203325438.ch187","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing Facility Physical Security 计算设施物理安全
Information Security Management Pub Date : 2000-10-20 DOI: 10.1201/9780203325438.CH195
A. Brusewitz
{"title":"Computing Facility Physical Security","authors":"A. Brusewitz","doi":"10.1201/9780203325438.CH195","DOIUrl":"https://doi.org/10.1201/9780203325438.CH195","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128604071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Perspectives on VPNs 对vpn的新看法
Information Security Management Pub Date : 2000-10-20 DOI: 10.1201/9780203325438.CH55
Keith Pasley
{"title":"New Perspectives on VPNs","authors":"Keith Pasley","doi":"10.1201/9780203325438.CH55","DOIUrl":"https://doi.org/10.1201/9780203325438.CH55","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117069901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deploying Host-Based Firewalls across the Enterprise: A Case Study 跨企业部署基于主机的防火墙:案例研究
Information Security Management Pub Date : 2000-10-20 DOI: 10.1201/9780203325438.ch57
Jeffery J. Lowder
{"title":"Deploying Host-Based Firewalls across the Enterprise: A Case Study","authors":"Jeffery J. Lowder","doi":"10.1201/9780203325438.ch57","DOIUrl":"https://doi.org/10.1201/9780203325438.ch57","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信