Suggested Topics within your search.
Suggested Topics within your search.
201
202
Published 2013
Table of Contents: ';
“... / Ezendu Ariwa, Carsten Martin Syvertsen -- A bio-inspired concept for information security modelling / O...”View fulltext via EzAccess
Electronic
203
Published 2009
Table of Contents: ';
“... Analysis in Text Mining for Information Security Applications / Shuting Xu, Xin Luo -- Data Mining...”View fulltext via EzAccess
Electronic
204
Published 2010
Table of Contents: ';
“... and Solange Ghernaouti- Hľie: A Security Assurance Model to holistically assess the Information Security...”Get full text
Electronic
205
Published 2013
Table of Contents: ';
“...-domain Public Key Infrastructure for Information Security with Use of a Multi-Agent System.-�Using Bees...”Get full text
Electronic
206
Published 2009
Table of Contents: ';
“... / Peter V. Raven, Xiaoqing Huang, Ben B. Kim -- A Model of Information Security Governance for E-Business...”View fulltext via EzAccess
Electronic
207
Published 2009
Table of Contents: ';
“... information security risk assessment class / Cindy S. York, Dazhi Yang, Melissa Dark....”View fulltext via EzAccess
Electronic
208
Published 2009
Table of Contents: ';
“... to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information...”View fulltext via EzAccess
Electronic
209
210
Published 2001
Table of Contents: ';
“... -- The Security Model to Combine the Corporate and Information Security -- Design Criteria to Classified...”View fulltext via EzAccess
Electronic
211
Published 2009
Table of Contents: ';
“... for Information Security Applications -- 40. Collaborative Filtering Based Recommendation Systems -- 41...”View fulltext via EzAccess
Electronic
212
Published 2010
Table of Contents: ';
“... with information security and privacy / B. Dawn Medlin, Charlie C. Chen -- 10. Intellectual property protection...”View fulltext via EzAccess
Electronic
213
Published 2013
Table of Contents: ';
“... identification in information security / Mrinal Kanti Bhowmik ... [et al.] -- Modernization of healthcare...”View fulltext via EzAccess
Electronic
214
Published 2012
Table of Contents: ';
“..., Mohammad Ayoub Khan -- 2. Industrial information security, safety, and trust / Ashraf Darwish ... [et al...”Chapter PDFs via platform:
Electronic
215
Published 2010
Table of Contents: ';
“.... Information Security Enhancement To PublicKey Cryptosystem Through Magic Squares -- 34. Resource Allocation...”Get full text
Electronic
216
Published 2008
Table of Contents: ';
“.... Implementing a Sound Public Information Security Program -- 63. Evaluation of E-Government Web Sites -- 64...”View fulltext via EzAccess
Electronic
217
Published 2009
Table of Contents: ';
“... Contemporary Practice / Dana Deravin Carr -- Practical Action and Mindfulness in Health Information Security...”View fulltext via EzAccess
Electronic
218
Published 2009
Table of Contents: ';
“...OpenDLib: A Digital Library Service System / Leonardo Candela ... [et al.] -- Information Security...”View fulltext via EzAccess
Electronic