Erscheinungsjahr
Medientyp
Datenquelle
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Datensicherheit
Suche ohne Synonyme: keywords:(Datensicherheit)
Verwendete Synonyme:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Earned value management in a data warehouse project
Emerald Group Publishing | 2006|Schlagwörter: Data security -
EDI security: a model of EDI risks and associated controls
Emerald Group Publishing | 1997|Schlagwörter: Data security -
E-enterprise security management life cycle
Emerald Group Publishing | 2005|Schlagwörter: Data security -
Effects on employees' information security abilities by e-learning
Emerald Group Publishing | 2009|Schlagwörter: Data security -
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Embedding privacy in IT applications development
Emerald Group Publishing | 2004|Schlagwörter: Data security -
Encylopedia of Information Ethics and Security
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Enterprise security architecture in business convergence environments
Emerald Group Publishing | 2005|Schlagwörter: Data security -
Estimates of success rates of remote arbitrary code execution attacks
Emerald Group Publishing | 2012|Schlagwörter: Data security -
Ethics among peers: file sharing on the internet between openness and precaution
Emerald Group Publishing | 2010|Schlagwörter: Data security -
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy
Emerald Group Publishing | 2013|Schlagwörter: Data security -
Evaluating the performance of open source software projects using data envelopment analysis
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Evaluating the security controls of CAIS in developing countries
An examination of current researchEmerald Group Publishing | 2007|Schlagwörter: Data security -
Evaluating the security controls of CAIS in developing countries: an empirical investigation
Emerald Group Publishing | 2007|Schlagwörter: Data security -
Evaluating user susceptibility to phishing attacks
Emerald Group Publishing | 2022|Schlagwörter: Data security -
Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system
Emerald Group Publishing | 2010|Schlagwörter: Data security -
Exploring national identification programs among web-enabled professionals
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Exploring organizational culture for information security management
Emerald Group Publishing | 2007|Schlagwörter: Data security -
Exploring the supply of pirate software for mobile devices
An analysis of software types and piracy groupsEmerald Group Publishing | 2010|Schlagwörter: Data security -
Factors impacting information governance in the mobile device dual-use context
Emerald Group Publishing | 2013|Schlagwörter: Data security -
Formal definition and implementation of business-oriented SoD access control policy
Emerald Group Publishing | 2004|Schlagwörter: Data security -
Formalizing the ranking of authentication products
Emerald Group Publishing | 2009|Schlagwörter: Data security -
Formal specification scheme for database applications using requirements particle networks
Emerald Group Publishing | 2002|Schlagwörter: Data integrity -
Formulating information systems risk management strategies through cultural theory
Emerald Group Publishing | 2006|Schlagwörter: Data security -
Frequency- and ordering-based similarity measure for host-based intrusion detection
Emerald Group Publishing | 2004|Schlagwörter: Data security -
From risk analysis to effective security management: towards an automated approach
Emerald Group Publishing | 2004|Schlagwörter: Data security -
Global e-commerce: a framework for understanding and overcoming the trust barrier
Emerald Group Publishing | 2003|Schlagwörter: Data security -
Government initiatives in information technology security
Emerald Group Publishing | 1997|Schlagwörter: Data security -
Health service employees and information security policies: an uneasy partnership?
Emerald Group Publishing | 2012|Schlagwörter: Data security -
How perceptions of justice affect security attitudes: suggestions for practitioners and researchers
Emerald Group Publishing | 2009|Schlagwörter: Data security -
How to abuse biometric passport systems
Emerald Group Publishing | 2012|Schlagwörter: Data security -
How well are information risks being communicated to your computer end-users?
Emerald Group Publishing | 2007|Schlagwörter: Data security -
Human aspects of information security
An empirical study of intentional versus actual behaviorEmerald Group Publishing | 2013|Schlagwörter: Data security -
Human-related problems of information security in East African cross-cultural environments
Emerald Group Publishing | 2010|Schlagwörter: Data security -
Hypertext information security model for organizations
Emerald Group Publishing | 1997|Schlagwörter: Data security -
Identifying linkages between statements in information security policy, procedures and controls
Emerald Group Publishing | 2012|Schlagwörter: Data security -
Impact of location-aware services on the privacy/security balance
Emerald Group Publishing | 2004|Schlagwörter: Data security -
Impact of perceived technical protection on security behaviors
Emerald Group Publishing | 2009|Schlagwörter: Data security -
Implementation and effectiveness of organizational information security measures
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Inadequate security encourages the thief
Emerald Group Publishing | 1995|Schlagwörter: Data security -
Incident response requirements for distributed security information management systems
Emerald Group Publishing | 2007|Schlagwörter: Data security -
Incorporating WS-Security into a Web services-based portal
Emerald Group Publishing | 2004|Schlagwörter: Data security -
Industrial information-weight security models
Emerald Group Publishing | 1998|Schlagwörter: Data security -
Informational inequality: the role of resources and attributes in information security awareness
Emerald Group Publishing | 2024|Schlagwörter: Data security -
Information governance: information security and access within a UK context
Emerald Group Publishing | 2010|Schlagwörter: Data security -
Information security and business continuity management in interorganizational IT relationships
Emerald Group Publishing | 2012|Schlagwörter: Data security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.