Information Security Management Handbook, 6th ed.最新文献

筛选
英文 中文
Roles and Responsibilities of the Information Systems Security Officer 信息系统安全主任的角色和职责
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch38
Carl Burney
{"title":"Roles and Responsibilities of the Information Systems Security Officer","authors":"Carl Burney","doi":"10.1201/9781439833032.ch38","DOIUrl":"https://doi.org/10.1201/9781439833032.ch38","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing the Response to a Computer Security Incident 管理对计算机安全事故的反应
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch226
Michael Vangelos
{"title":"Managing the Response to a Computer Security Incident","authors":"Michael Vangelos","doi":"10.1201/9781439833032.ch226","DOIUrl":"https://doi.org/10.1201/9781439833032.ch226","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certification and Accreditation Methodology 认证及认可方法
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch189
M. Krehnke, David C. Krehnke
{"title":"Certification and Accreditation Methodology","authors":"M. Krehnke, David C. Krehnke","doi":"10.1201/9781439833032.ch189","DOIUrl":"https://doi.org/10.1201/9781439833032.ch189","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Closed-Circuit Television and Video Surveillance 闭路电视和视频监控
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch101
David A. Litzau
{"title":"Closed-Circuit Television and Video Surveillance","authors":"David A. Litzau","doi":"10.1201/9781439833032.ch101","DOIUrl":"https://doi.org/10.1201/9781439833032.ch101","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Reality of Virtual Computing 虚拟计算的现实
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch108
Chris Hare
{"title":"The Reality of Virtual Computing","authors":"Chris Hare","doi":"10.1201/9781439833032.ch108","DOIUrl":"https://doi.org/10.1201/9781439833032.ch108","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"59 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Human Side of Information Security 信息安全的人的一面
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch13
Kevin Henry
{"title":"The Human Side of Information Security","authors":"Kevin Henry","doi":"10.1201/9781439833032.ch13","DOIUrl":"https://doi.org/10.1201/9781439833032.ch13","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
PKI Registration PKI车主
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch92
A. Golod
{"title":"PKI Registration","authors":"A. Golod","doi":"10.1201/9781439833032.ch92","DOIUrl":"https://doi.org/10.1201/9781439833032.ch92","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116313089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Examination of Firewall Architectures 防火墙架构的检查
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch146
P. Henry
{"title":"An Examination of Firewall Architectures","authors":"P. Henry","doi":"10.1201/9781439833032.ch146","DOIUrl":"https://doi.org/10.1201/9781439833032.ch146","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Voice Communications (VoI) 安全语音通讯(VoI)
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch162
Valene Skerpac
{"title":"Secure Voice Communications (VoI)","authors":"Valene Skerpac","doi":"10.1201/9781439833032.ch162","DOIUrl":"https://doi.org/10.1201/9781439833032.ch162","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"63 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120817723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counter-Economic Espionage 对抗经济间谍活动
Information Security Management Handbook, 6th ed. Pub Date : 2019-08-08 DOI: 10.1201/9781439833032.ch75
Craig A. Schiller
{"title":"Counter-Economic Espionage","authors":"Craig A. Schiller","doi":"10.1201/9781439833032.ch75","DOIUrl":"https://doi.org/10.1201/9781439833032.ch75","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信