The Effects of Outsourcing on Information Security (Englisch)
- Neue Suche nach: Alner, M.
- Neue Suche nach: Alner, M.
In:
INFORMATION SYSTEMS SECURITY
;
10
;
35-43
;
2001
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:The Effects of Outsourcing on Information Security
-
Beteiligte:Alner, M. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS SECURITY ; 10 ; 35-43
-
Verlag:
- Neue Suche nach: AUERBACH PUBLICATIONS
-
Erscheinungsdatum:01.01.2001
-
Format / Umfang:9 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.8 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 10
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2
-
The Job Market for the Information Security ProfessionalOtt, J. L. et al. | 2001
- 5
-
Criminalizing Tool BuildingPoore, R. S. et al. | 2001
- 10
-
Corporate Espionage and What Can Be Done to Prevent ItRothke, B. et al. | 2001
- 10
-
Security Is All About Business, Not TechnologyCorby, M. J. et al. | 2002
- 13
-
Information Security Policy Framework: Best Practices for Security Policy in the E-commerce AgePalmer, M. E. / Robinson, C. / Patilla, J. / Moser, E. P. et al. | 2001
- 14
-
Understanding Risk (or the Bombastic Prose and Soapbox Oratory of a 25-Year Veteran of the Computer Security WarsErwin, D. G. et al. | 2002
- 17
-
To Disclose or Not to Disclose: A Primer for ISPsDembin, M. / Kenneally, E. et al. | 2001
- 18
-
Security of Virtual Private NetworksTiller, J. S. et al. | 2001
- 18
-
The Changing Face of Continuity PlanningJackson, C. B. et al. | 2002
- 19
-
Privacy and Security in E-Healthcare Information ManagementWen, H. J. / Tarn, J. M. et al. | 2001
- 21
-
Beyond the Maginot-Line Mentality: A Total-Process View of Information Security Risk ManagementPaliotta, A. R. et al. | 2001
- 22
-
Meeting the EnemyKaplan, R. et al. | 2002
- 28
-
Outsourcing Internet Security: The Life You Save May Be Your Company'sWilbanks, J. et al. | 2001
- 29
-
Learning the Computer Forensic WayKuchta, K. et al. | 2001
- 31
-
Remote Access Security IssuesPeltier, T. R. et al. | 2002
- 35
-
The Effects of Outsourcing on Information SecurityAlner, M. et al. | 2001
- 35
-
Executives Need to Know: The Arguments to Include in a Benefits Justification for Increased Cyber Security SpendingBraithwaite, T. et al. | 2001
- 36
-
The People, Policy, Technology (PPT) Model: Core Elements of the Security ProcessSchlarman, S. S. et al. | 2001
- 37
-
Computers at Risk - Ten Years AfterTipton, H. F. et al. | 2002
- 38
-
Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!Flusche, K. J. et al. | 2001
- 42
-
Forensic Methodologies: A Computer Forensic Professional's Compass!Kuchta, K. J. et al. | 2002
- 42
-
On the 6th Day: A Nonprofessional's View of Information Systems SecurityDarragh, D. M. / Darragh, S. M. et al. | 2001
- 44
-
Building a Computer Forensics LaboratoryKuchta, K. J. et al. | 2001
- 48
-
Information Security Training: Make It Happen Part 2 of 2Hansche, S. et al. | 2001
- 49
-
Your Computer Forensic ToolkitKuchta, K. J. et al. | 2001
- 51
-
Information Security Training: Making It Happen: Part 2 of 2Hansche, S. et al. | 2001
- 51
-
Wired and Wireless Physical Layer Security IssuesTrulove, J. et al. | 2001
- 52
-
Preventing Credit Card Fraud and Identity Theft: A Primer for Online MerchantsFichtman, P. et al. | 2001
- 71
-
Top 10 Ways to Prevent Denial of Service AttacksWalters, R. et al. | 2001