结果:找到“Information Security”相关内容68个,排序为按回复时间降序,搜索更多相关帖子请点击“高级
【TISAX, ISA, IMSM】VDA TISAX 中英文版及相关认证要求说明、表格
6 个回复 - 3972 次查看 【TISAX, ISA, IMSM】VDATISAX 中英文版及相关认证要求说明、表格温馨提示:我们翻译的VDA TISAX 中文版,购买后,不得在其它网上、微信、QQ等平台、媒体上发布! 1> [TISAX]TISAX·ENX Portal.pdf2> 20181107_ ...2019-11-25 12:03 - Mujahida - 现金交易版
TISAX,ISMS: 全套信息安全管理体系文件+学习培训视频
8 个回复 - 3777 次查看 TISAX,ISMS: 全套信息安全管理体系 1. 什么是TISAX?2017年底,VDA和ENX联合为VDA ISA创建TISAX(Trusted Information Security Assessment Exchange):信息安全的评估和交换机制,可以实现汽车行业信息安全评 ...2019-11-21 20:54 - Mujahida - 现金交易版
信息安全:PKI技术及其应用, 网络和信息安全,Public Key Infrastructure
2 个回复 - 980 次查看 信息安全:PKI技术及其应用, Public Key Infrastructure Network and information security Agenda:1. 了解PKI及其功能2. 掌握PKI所提供的组件及其功能3. 了解PKI各个组件中所使用的协议4. 理解PK ...2019-10-27 12:57 - Mujahida - 现金交易版
[免费下载] The Economics of Information Security and Privacy
5 个回复 - 5801 次查看 © 2013 The Economics of Information Security and Privacy Editors: Böhme, Rainer (Ed.) In the late 1990s, researchers began to grasp that the roots of many information security failu ...2015-7-27 11:38 - behappie - 国防经济学
Information Security Handbook
33 个回复 - 1940 次查看 Packt | 2017 | ISBN 978-1-78847-883-0 | 325 pages | PDF **** 本内容被作者隐藏 ****2018-7-11 11:43 - igs816 - 经管书评
Information Theoretic Security and Privacy of Information Systems
6 个回复 - 495 次查看 Information Theoretic Security and Privacy of Information Systems By 作者: Ashish Khisti, H. Vincent Poor, Holger Boche, Rafael F. Schaefer ISBN-10 书号: 1107132266 ISBN-13 书号: 9781107132269 Edi ...2018-12-12 16:45 - 13950050756 - 经管书评
Information Security Policies, Procedures, and Standards 英文版
4 个回复 - 2541 次查看 ITM 课程教材2019-4-22 06:33 - aw0248 - 管理信息系统
The CIO’s Guide to Information Security Incident Management
4 个回复 - 339 次查看 The CIO’s Guide to Information Security Incident Management By 作者: Matthew William Arthur Pemble – Wendy Fiona Goucher ISBN-10 书号: 1466558253 ISBN-13 书号: 9781466558250 Edition 版本: 1 出版 ...2018-12-17 23:28 - 13950050756 - 经管书评
【信息安全原理,700+页】 Principles of Information Security (4th Edition)
10 个回复 - 2302 次查看 Principles of Information Security, 4th Edition Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University Herbert J. Mattord Michael J. Coles College of Business, Kennesaw ...2017-1-18 14:08 - cmwei333 - winbugs及其他软件专版
Information security management standards: Problems and solutions
4 个回复 - 797 次查看 【作者(必填)】Mikko Siponena, Robert Willisonb 【文题(必填)】Information security management standards: Problems and solutions 【年份(必填)】2009 【全文链接或数据库名称(选填)】http://www.s ...2017-2-20 21:07 - kychan - 求助成功区
Management of Information Security, 6th Edition
6 个回复 - 761 次查看 Management of Information Security By 作者: Michael E. Whitman – Herbert J. Mattord ISBN-10 书号: 133740571X ISBN-13 书号: 9781337405713 Edition 版本: 6 出版日期: 2018-05-03 pages 页数: (672 ) ...2019-2-20 11:00 - 13950050756 - 经管书评
Principles of Information Security 4th ed. - M. Whitman, et. al., (Cengage
1 个回复 - 839 次查看 Principles of Information Security 4th ed. - M. Whitman, et. al., (Cengage, 2012)2018-9-6 16:15 - kawazhang - 运营管理(物流与供应链管理)
【学习笔记】Management of Information Security 6th
3 个回复 - 711 次查看 Management of Information Security 6th2020-2-5 23:37 - 5558_1579501255 - Forum
【学习笔记】Information Security 英语作文六级预测
3 个回复 - 2310 次查看 Information Security 英语作文六级预测2019-9-28 15:27 - Antoinette沁 - Forum
Handbook of Information and Communication Security
0 个回复 - 337 次查看 内容简介 · · · · · ·"The Handbook of Information and Communication Security" covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (i ...2018-11-2 16:13 - 诗人都在海底 - 休闲灌水
Port Cybersecurity: Securing Critical Information Infrastructures and Supply
12 个回复 - 761 次查看 Elsevier | 2018 | ISBN 978-0-12-811818-4 | 203 pages | PDF **** 本内容被作者隐藏 ****2018-7-5 13:55 - igs816 - 经管书评
Information Security Management Systems
10 个回复 - 709 次查看 Apple Academic Press | 2018 | ISBN 978-1-77188-577-5 | 327 pages | PDF **** 本内容被作者隐藏 ****2018-7-5 15:31 - igs816 - 经管书评
Information Security: Foundations, Technologies and Applications
8 个回复 - 567 次查看 English | PDF | 2018 | 418 Pages | ISBN : 1849199744 The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data ...2018-5-29 10:44 - igs816 - 经管书评
INTRODUCTION TO MACHINE LEARNING with APPLICATIONS in INFORMATION SECURITY
2 个回复 - 836 次查看 For our purposes, we’ll view machine learning as a form of statistical discrimination, where the “machine” does the heavy lifting. That is, the computer “learns” important information, saving us ...2018-5-2 15:53 - wsxxc007 - Forum
Practical Information Security Management (2016), 原版 PDF + EPUB
8 个回复 - 1539 次查看 Practical Information Security Management A Complete Guide to Planning and Implementation Authors: Tony Campbell Shows readers how to create security-focused business propositions balancing ...2016-12-2 04:17 - cmwei333 - winbugs及其他软件专版
Introduction to Machine Learning with Applications in Information Security
10 个回复 - 916 次查看 Chapman and Hall/CRC (August 11, 2017) | ISBN: 978-1138626782 | 364 pages | PDF (true) | 7.5 M Introduction to Machine Learning with Applications in Information Security provides a class-tested i ...2017-10-22 22:01 - igs816 - 经管书评
Predictive Computing and Information Security
16 个回复 - 827 次查看 English | PDF | 2017 | 175 Pages | ISBN : 9811051062 | 5.7 MB This book describes various methods and recent advances in predictive computing and information security. It highlights various predict ...2017-9-29 22:09 - igs816 - 经管书评
求:Information Security Risk Assessment of Smart Grid
1 个回复 - 640 次查看 【作者(必填)】 【文题(必填)】Information Security Risk Assessment of Smart Grid Based on Absorbing Markov Chain and SPA 【年份(必填)】 【全文链接或数据库名称(选填)】https://www.degruyter.com/vi ...2017-9-15 20:45 - xiaoshiyue - 求助成功区
Comparison of information security decisions under different security and busine
1 个回复 - 435 次查看 【作者(必填)】 [*]Yong Wu [*]Gengzhong Feng [*]Richard Y. K. Fung 【文题(必填)】 Comparison of information security decisions under different security and business environments【年份(必填)】 2 ...2017-7-6 16:28 - timesever - 求助成功区
Improving the quality of information security management systems with ISO27000
3 个回复 - 729 次查看 【作者(必填)】 Alan Gillies 【文题(必填)】 Improving the quality of information security management systems with ISO27000 【年份(必填)】2011 【全文链接或数据库名称(选填)】http://www.emeral ...2017-2-20 20:55 - kychan - 求助成功区
Information security architecture
2 个回复 - 907 次查看 【作者(必填)】J.H.P. Eloff , M.M. Eloff 【文题(必填)】Information security architecture 【年份(必填)】2005 【全文链接或数据库名称(选填)】http://www.sciencedirect.com/science/article/pii/S1 ...2017-2-20 21:03 - kychan - 求助成功区
【信息安全:参考大全】 Information Security : The Complete Reference (2e)
3 个回复 - 1442 次查看 Information Security: The Complete Reference, 2nd Edition by Mark Rhodes-Ousley (Author) Develop and implement an effective end-to-end security program Today’s complex world of mobile p ...2016-12-25 09:14 - cmwei333 - winbugs及其他软件专版
Employees' Information Security Awareness and Behavior
3 个回复 - 608 次查看 【作者(必填)】Benedikt Lebek ; Jörg Uffen ; Michael H. Breitner ; Markus Neumann ; Bernd Hohler 【文题(必填)】Employees' Information Security Awareness and Behavior: A Literature Review 【 ...2016-12-24 18:51 - kychan - 求助成功区
Factors influencing information security management in small- and medium-sized e
4 个回复 - 702 次查看 【作者(必填)】Ebru Yeniman Yildirim , Gizem Akalp, Serpil Aytac, Nuran Bayram 【文题(必填)】Factors influencing information security management in small- and medium-sized enterprises: A case study ...2016-12-7 17:54 - kychan - 求助成功区
Managing Employee Compliance with Information Security Policies
3 个回复 - 803 次查看 【作者(必填)】Qing Hu, Tamara Dinev, Paul Hart, Donna Cooke 【文题(必填)】Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Cul ...2016-12-6 21:50 - kychan - 求助成功区
An empirical study of rationality-based beliefs and information security awaren
3 个回复 - 632 次查看 【作者(必填)】 Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat 【文题(必填)】 Information security policy compliance: an empirical study of rationality-based beliefs and information security awa ...2016-12-7 18:47 - kychan - 求助成功区
Self-efficacy in information security
3 个回复 - 759 次查看 【作者(必填)】Hyeun-Suk Rhee, Cheongtag Kim, Young U. Ryu 【文题(必填)】Self-efficacy in information security: Its influence on end users' information security practice behavior 【年份(必填)】20 ...2016-12-7 18:27 - kychan - 求助成功区
Security lapses and the omission of information security measures
2 个回复 - 843 次查看 【作者(必填)】Michael Workman, William H. Bommer, Detmar Straub 【文题(必填)】Security lapses and the omission of information security measures: A threat control model and empirical test 【年份 ...2016-12-7 17:13 - kychan - 求助成功区
Encouraging information security behaviors in organizations
2 个回复 - 685 次查看 【作者(必填)】Tejaswini Heratha , H.R. Rao 【文题(必填)】Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness 【年份(必填)】2009 ...2016-12-7 09:03 - kychan - 求助成功区
Variables influencing information security policy compliance
2 个回复 - 680 次查看 【作者(必填)】 Teodor Sommestad , Jonas Hallberg ,Kristoffer Lundholm 【文题(必填)】Variables influencing information security policy compliance: A systematic review of quantitative studies 【年 ...2016-12-6 21:40 - kychan - 求助成功区
【独家发布】【2016新书】Information and Communications Security
6 个回复 - 1849 次查看 如果喜欢该文档,欢迎订阅【2016新书】文库,http://bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3187 图书名称:Information and Communications Security: 17th International Conference, ICIC ...2016-8-24 17:28 - 牛尾巴 - 管理信息系统
A Theory of Employee Compliance with Information Security
3 个回复 - 718 次查看 【作者(必填)】Sikolia, David; Mason, Marlys; Biros, David; and Weiser, Mark 【文题(必填)】A Theory of Employee Compliance with Information Security 【年份(必填)】2014 【全文链接或数据库名称(选 ...2016-10-31 09:33 - kychan - 求助成功区
英文文献Group Decision Making in Information Systems Security Assessment Using D
2 个回复 - 589 次查看 【作者(必填)】 Dejian Yu, José M. Merigó, Yejun Xu: 【文题(必填)】 Group Decision Making in Information Systems Security Assessment Using Dual Hesitant Fuzzy Set 【年份(必填)】 (2016) 【全文链 ...2016-11-4 15:29 - hanshuang - 求助成功区
Estimating Security Betas Using Prior Information Based on Firm Fundamentals
2 个回复 - 819 次查看 【作者(必填)】Mathijs Cosemans 【文题(必填)】Estimating Security Betas Using Prior Information Based on Firm Fundamentals 【年份(必填)】2016 【全文链接或数据库名称(选填)】http://rfs.oxfordjou ...2016-9-19 23:08 - MemMao - 求助成功区
信息安全原理 第2版 中文版 Principles of information security, Michael Whitman
1 个回复 - 1630 次查看 网上买的,分享一下,扫描版 高清晰2016-9-3 22:16 - Fan5219812 - 数据分析与数据挖掘
【独家发布】【2016新书】Information Security and Cryptology - ICISC 2015
2 个回复 - 1045 次查看 如果喜欢该文档,欢迎订阅【2016新书】文库,http://bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3187 图书名称:Information Security and Cryptology - ICISC 2015: 18th International Confere ...2016-8-25 09:58 - 牛尾巴 - winbugs及其他软件专版
【独家发布】【2016新书】Information Security and Privacy Part I
3 个回复 - 1612 次查看 如果喜欢该文档,欢迎订阅【2016新书】文库,http://bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3187 图书名称:Information Security and Privacy: 21st Australasian Conference, ACISP 2016, ...2016-8-22 20:11 - 牛尾巴 - 管理信息系统
Economic incentives in security information sharing: the effects of market struc
1 个回复 - 613 次查看 【作者(必填)】 [*]Xing Gao [*], Weijun Zhong 【文题(必填)】 Economic incentives in security information sharing: the effects of market structures【年份(必填)】 2015 【全文链接或数据库名称(选填 ...2016-5-10 09:29 - timesever - 求助成功区
A game-theoretic analysis of information sharing and security investment for com
1 个回复 - 587 次查看 【作者(必填)】 [*]Xing Gao, [*]Weijun Zhong [*]& Shue Mei 【文题(必填)】 A game-theoretic analysis of information sharing and security investment for complementary firms【年份(必填)】 2013 【 ...2016-5-10 09:31 - timesever - 求助成功区
Information Security Analytics (with R)
4 个回复 - 900 次查看 Security Analytics nformation Gives you INTO Insights at The Practice of Analytics and, More importantly, How you CAN UTILIZE Analytic Techniques to the Identify Trends and Outliers that May Not Poss ...2016-5-5 22:21 - luxplanto - python论坛
Risk management--principle of information security
2 个回复 - 1634 次查看 新人首次发帖分享资料,求过2013-2-27 08:10 - catherinezcx - 金融学(理论版)
Principles of Information Security Fourth Edition
0 个回复 - 989 次查看 Principles of Information Security Fourth Edition Authors: Michael E. Whitman, Ph.D., CISM, CISSP Herbert J. Mattord, CISM, CISSP Publisher: Cengage Learning ISBN-13: 978-1-111-13821-9 ...2016-1-12 04:52 - SACFWKEBVDNZC - 金融学(理论版)
Information Disclosure and the Diffusion of Information Security Attacks
1 个回复 - 597 次查看 【作者(必填)】 Sabyasachi Mitra, Sam Ransbotham 【文题(必填)】 Information Disclosure and the Diffusion of Information Security Attacks 【年份(必填)】 2015 【全文链接或数据库名称(选填)】 http: ...2015-12-10 15:30 - timesever - 求助成功区
【2015新书】After Snowden: Privacy, Secrecy, and Security in the Information Age
38 个回复 - 3270 次查看 【2015新书】After Snowden: Privacy, Secrecy, and Security in the Information Age Book 图书名称:After Snowden: Privacy, Secrecy, and Security in the Information Age Author 作者:Ronald Goldfarb, ...2015-5-21 10:08 - kychan - 管理科学
【2014新书】Information governance and security
15 个回复 - 2724 次查看 Information governance and security : Protecting and managing your company's proprietary information Book 图书名称: Information governance and security : Protecting and managing your company's ...2014-12-31 14:11 - kychan - 管理科学
Information Security Investment Strategies in Supply Chain Firms
0 个回复 - 1029 次查看 【作者(必填)】Information Security Investment Strategies in Supply Chain Firms Bandyopadhyay, Tridib; Jacob, Varghese S.; and Raghunathan, Srinivasan, 【文题(必填)】 "Information Security Investme ...2014-8-19 17:12 - duduxiao - 文献求助专区
40币求助“Contracting Information Security in the Presence of Double Moral Hazar
2 个回复 - 1176 次查看 【作者(必填)】Chul Ho Lee 等 【文题(必填)】Contracting Information Security in the Presence of Double Moral Hazard 【年份(必填)】2013 【全文链接或数据库名称(选填)】http://pubsonline.informs.org ...2014-7-17 11:12 - 茵陈 - 求助成功区
求助文献:Information Security Management: A System Dynamics Approach
2 个回复 - 1177 次查看 【作者(必填)】Derek Nazareth and Jae Choi 【文题(必填)】Information Security Management: A System Dynamics Approach 【年份(必填)】AMCIS 2012 【全文链接或数据库名称(选填)】http://aisel.aisnet. ...2014-7-7 17:40 - duduxiao - 求助成功区
Strategic Information Systems Security: Definition and Theoretical Model
3 个回复 - 904 次查看 【作者(必填)】 Andy Luse, Oklahoma State University - Main Campus Brian Mennecke, Iowa State University Anthony Townsend, Iowa State University Samuel Demarie, Iowa State University 【文题(必填 ...2013-9-7 16:36 - duduxiao - 求助成功区
A study of the security of Internet banking and financial private information
1 个回复 - 729 次查看 【作者(必填)】JH Lee, WG Lim, JI Lim 【文题(必填)】A study of the security of Internet banking and financial private information in South Korea 【年份(必填)】2013 【全文链接或数据库名称(选填 ...2014-3-11 16:07 - wlw19881023 - 求助成功区
Managing Information Systems Security and Privacy
3 个回复 - 2649 次查看 2006 Managing Information Systems Security and PrivacyAuthors: [*]Assoc. Prof. Denis Trček Ph.D. [*]…show all 1hide ISBN: 978-3-540-28103-0 (Print) 978-3-540-28104-7 (Online) Trcek ...2013-4-24 10:11 - Toyotomi - 管理信息系统
Information Security Governance
3 个回复 - 2503 次查看 2009 Information Security GovernanceAuthors: [*]S.H. Solms, [*]Rossouw Solms [*]…show all 2hide ISBN: 978-0-387-79983-4 (Print) 978-0-387-79984-1 (Online) Solms, S.H., Solms, Rossouw ...2013-4-27 18:35 - Toyotomi - 管理信息系统
Hotel Information Technology Security: Do Hoteliers Understand the Risks?
2 个回复 - 874 次查看 【作者(必填)】Jungsun Sunny Kima*, John Farrishb & Thomas Schrierc 【文题(必填)】Hotel Information Technology Security: Do Hoteliers Understand the Risks? 【年份(必填)】2013 【全文链接或数据 ...2013-8-24 12:40 - husteconyy - 求助成功区
Integration of Information for Environmental Security
1 个回复 - 1337 次查看 NATO Science for Peace and Security Series C: Environmental Security 2008 Integration of Information for Environmental SecurityEditors: [*]H. Gonca Coskun, [*]H. Kerem Cigizoglu, [*]M. Derya Makt ...2013-4-21 11:10 - Toyotomi - 管理信息系统
求助会议论文:Information Security Investment with Different Information Types
2 个回复 - 868 次查看 【作者(必填)】D Liu, Y Ji, VM Mookerjee 【文题(必填)】Information Security Investment with Different Information Types: A Two-Firm Analysis 【年份(必填)】AMCIS 2005 PROCEEDINGS[/backcolor] 【 ...2013-6-25 09:58 - duduxiao - 求助成功区
Managing Information Risk and the Economics of Security
0 个回复 - 1406 次查看 2009 Managing Information Risk and the Economics of SecurityEditors: [*]M. Eric Johnson [*]…show all 1hide ISBN: 978-0-387-09761-9 (Print) 978-0-387-09762-6 (Online) Johnson, M. Eric (E ...2013-4-24 10:06 - Toyotomi - 管理信息系统
Managing Risk and Information Security Protect to Enable
0 个回复 - 1921 次查看 2013 Managing Risk and Information SecurityProtect to EnableAuthors: [*]Malcolm Harkins [*]…show all 1hide ISBN: 978-1-4302-5113-2 (Print) 978-1-4302-5114-9 (Online) Protect to Enable Ha ...2013-4-23 10:21 - Toyotomi - 管理信息系统
文献求助+Information Security Outsourcing with System Interdependency and Mandat
2 个回复 - 969 次查看 【作者(必填)】 Kai-Lung Hui A1, Wendy Hui A2, Wei T. Yue A3 【文题(必填)】 Information Security Outsourcing with System Interdependency and Mandatory Security Requirement【年份(必填)】 2012 【全 ...2013-4-9 19:46 - wwltm - 求助成功区
Multi-Layers of Information Security in Emergency Response
0 个回复 - 854 次查看 【作者(必填)】Dan Harnesk (Luleå University of Technology, Sweden) and Heidi Hartikainen (Luleå University of Technology, Sweden) 【文题(必填)】Multi-Layers of Information Security in ...2013-1-20 10:32 - 酷海 - 文献求助专区
Classification of security properties (Part I: Information flow
2 个回复 - 953 次查看 Classification of security properties (Part I: Information flow) R Focardi… - Revised versions of lectures given during the …, 2000 - dl.acm.org 谢谢了2011-11-30 19:56 - 金融坦然 - 求助成功区
Journal of Information Security《信息安全》期刊导读
0 个回复 - 2256 次查看 Journal of Information Security《信息安全》期刊导读 ISSN: 2153-1234 (Print) 2153-1242 (Online). 《信息安全》JIS免费下载网址: http://www.scirp.org/journal/jis. Table of Contents(Vol.02 No.03, Jul. ...2011-8-5 09:33 - wolixu - 休闲灌水
Deloitte_wave_information_security_and_risk_consulting_services.pdf
0 个回复 - 1347 次查看 Deloitte_wave_information_security_and_risk_consulting_services.pdf2010-10-31 03:16 - lhs123 - 论文版
Economics of Information Security and Privacy
1 个回复 - 1444 次查看 Tyler Moore, David Pym, Christos Ioannidis - Economics of Information Security and Privacy The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary re ...2010-9-9 18:59 - terrytong - 国民经济管理