1–50 von 444 Ergebnissen

Sortieren nach: Relevanz | Aktualität neu zuerst | Titel A-Z

Synonyme wurden verwendet für: Datensicherheit

Suche ohne Synonyme: keywords:(Datensicherheit)

Verwendete Synonyme:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions

    Note, Margot | Emerald Group Publishing | 2009
    Schlagwörter: Security of data
  2.  

    Formal specification scheme for database applications using requirements particle networks

    Vatanawood, Wiwat / Rivepiboon, Wanchai | Emerald Group Publishing | 2002
    Schlagwörter: Data integrity
  3.  

    A note on the using of accounting databases

    Yang, David C. / Vasarhelyi, Miklos A. / Liu, Caixing | Emerald Group Publishing | 2003
    Schlagwörter: Data integrity
  4.  

    Personalized cognitive passwords: an exploratory assessment

    Lazar, Lior / Tikolsky, Omer / Glezer, Chanan et al. | Emerald Group Publishing | 2011
    Schlagwörter: Data security
  5.  

    The History of Information Security: A Comprehensive Handbook

    Greifender, Elke / Bar Ilan, Judit | Emerald Group Publishing | 2008
    Schlagwörter: Data security, Security of data
  6.  

    Towards privacy in personal data management

    Efraimidis, Pavlos S. / Drosatos, Georgios / Nalbadis, Fotis et al. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  7.  

    Using crime data in academic research: issues of comparability and integrity

    Ludwig, Anika / Marshall, Mary | Emerald Group Publishing | 2015
    Schlagwörter: Data integrity
  8.  

    The Visible Employee

    Freeman, Mike | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  9.  

    Vulnerability analysis and the practical implications of a server-challenge-based one-time password system

    Yang, Seung S. / Choi, Hongsik | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  10.  

    Web and Information Security

    du Preez, Madely | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  11.  

    A study of the performance evaluation of a network intrusion detection system

    Chen, Ruey-Shin / Chung, Yu-Ming / Tsai, Chih-Hung | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  12.  

    DNA dataveillance: protecting the innocent?

    Vartapetiance Salmasi, Anna / Gillam, Lee | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  13.  

    Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

    Hutton, D.M. | Emerald Group Publishing | 2005
    Schlagwörter: Data security
  14.  

    An integrated view of human, organizational, and technological challenges of IT security management

    Werlinger, Rodrigo / Hawkey, Kirstie / Beznosov, Konstantin | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  15.  

    SISG: self-immune automated signature generation for polymorphic worms

    Xiaosong, Zhang / Ting, Chen / Dapeng, Chen et al. | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  16.  

    Anonymity and authenticity in the cloud: issues and applications

    Delozier, Eric P. | Emerald Group Publishing | 2013
    Schlagwörter: Data integrity
  17.  

    Implementation and effectiveness of organizational information security measures

    Merete Hagen, Janne / Albrechtsen, Eirik / Hovden, Jan | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  18.  

    Towards an analysis of WonGoo performance

    Lu, Tianbo / Fang, Binxing / Sun, Yuzhong et al. | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  19.  

    Shining light on the dark side of ambient intelligence

    Wright, David / Gutwirth, Serge / Friedewald, Michael | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  20.  

    An agent-based privacy-enhancing model

    Lee, Hsu-Hui / Stamp, Mark | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  21.  

    Securing Web Services: Practical Usage of Standards and Specifications

    Anh Tran, Lan | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  22.  

    Information security management objectives and practices: a parsimonious framework

    Ma, Qingxiong / Johnston, Allen C. / Pearson, J. Michael | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  23.  

    A multidimensional approach to multilevel security

    Winjum, Eli / Kjetil Mølmann, Bjørn | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  24.  

    An integrated identity verification system for mobile terminals

    Mazhelis, Oleksiy / Markkula, Jouni / Veijalainen, Jari | Emerald Group Publishing | 2005
    Schlagwörter: Data security
  25.  

    Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers

    Howard, W.R. | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  26.  

    Assessing and improving authentication confidence management

    Pearce, Michael / Zeadally, Sherali / Hunt, Ray | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  27.  

    Schneier on Security

    Howard, W.R. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  28.  

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Pieters, W. / Consoli, L. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  29.  

    Setting up a Grid-CERT: experiences of an academic CSIRT

    Möller, Klaus | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  30.  

    Reacting to cyber-intrusions: the technical, legal and ethical dilemmas

    Overill, Richard E. | Emerald Group Publishing | 2004
    Schlagwörter: Data security
  31.  

    Information transparency and digital privacy protection: are they mutually exclusive in the provision of e-services?

    Hung, Humphry / Wong, Y.H. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  32.  

    A STOPE model for the investigation of compliance with ISO 17799-2005

    Saad Saleh, Mohamed / Alrabiah, Abdullah / Haj Bakry, Saad | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  33.  

    Pervasive computing and an aging populace

    Methodological challenges for understanding privacy implications
    Shankar, Kalpana | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  34.  

    Production data modelling: an integrated approach

    Yeh, Chung-Hsing | Emerald Group Publishing | 1995
    Schlagwörter: Data integrity
  35.  

    Up for sale: consumer medical information

    Levy, Marian / Royne, Marla B. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  36.  

    Collaborative attack on Internet users' anonymity

    Puzis, Rami / Yagil, Dana / Elovici, Yuval et al. | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  37.  

    GSR “DE” Series of digital recorders with removable drives

    Emerald Group Publishing | 2006
    Schlagwörter: Data security
  38.  

    Awarding world-leading innovation

    Inaugural awards celebrate top innovators
    Emerald Group Publishing | 2006
    Schlagwörter: Data security
  39.  

    Protecting privacy in system design: the electronic voting case

    Kavakli, Evangelia / Gritzalis, Stefanos / Christos, Kalloniatis | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  40.  

    Making a security and compliance investment: how to value what you pay for

    Mazer, Murray | Emerald Group Publishing | 2007
    Schlagwörter: Data security
  41.  

    Optimizing investment decisions in selecting information security remedies

    Shirtz, Dov / Elovici, Yuval | Emerald Group Publishing | 2011
    Schlagwörter: Data security
  42.  

    Impact of perceived technical protection on security behaviors

    Zhang, Jie / Reithel, Brian J. / Li, Han | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  43.  

    Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users

    Styles, Martyn / Tryfonas, Theo | Emerald Group Publishing | 2009
    Schlagwörter: Data security
  44.  

    Knowledge management needs security too

    Ryan, Julie J.C.H. | Emerald Group Publishing | 2006
    Schlagwörter: Data security
  45.  

    A partial equilibrium view on security and privacy

    Katos, Vasilios / Patel, Ahmed | Emerald Group Publishing | 2008
    Schlagwörter: Data security
  46.  

    A new “Ring of Gyges” and the meaning of invisibility in the information revolution

    Pagallo, Ugo | Emerald Group Publishing | 2010
    Schlagwörter: Data security
  47.  

    On security preparations against possible IS threats across industries

    Jung-Ting Chang, Arthur / Yeh, Quey-Jen | Emerald Group Publishing | 2006
    Schlagwörter: Data security
  48.  

    Towards an insider threat prediction specification language

    Magklaras, G.B. / Furnell, S.M. / Brooke, P.J. | Emerald Group Publishing | 2006
    Schlagwörter: Data security
  49.  

    Naked in Cyberspace: How to Find Personal Information Online (2nd ed.)

    Fourie, Ina | Emerald Group Publishing | 2003
    Schlagwörter: Data security
  50.  

    2011 Awards for Excellence

    Emerald Group Publishing | 2012
    Schlagwörter: Data security

Ergebnisse anzeigen: 10 | 20 | 50

Feedback