Biblio

Export 16952 results:
In Press
"Editorial." Information & Security: An International Journal 30, no. 1 (In Press): 1-10.
2019
van Tonder, Bradley, and Janet Wesson. Adaptive Interfaces for Mobile Map-based Visualisation., 2019.
Ihia, Marouane, and Omar Khadir. "Amelioration of ElGamal Digital Signature Schemes." Information & Security: An International Journal 42 (2019).
Fuentes, Gonzalo Álvarez, and Margarita Figueroa Sepúlveda. "América Latina y el desafío de la planificación basada en capacidades. Aportes preliminares desde la experiencia de Chile." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 1 (2019).
The Bulgarian Institute of Public Administration (IPA)., 2019.
COBIT resources., 2019.
Herrera, Luis-Carlos, and Olaf Maennel. "A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Morris, Gerald F.. The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada. Northcentral University, 2019.
CYREX 2018 Web Page., 2019.
Zareapoor, Masoumeh, Pourya Shamsolmoali, and Afshar M. Alam. "Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019.
The Defence Innovation Greenhouse., 2019.
DeviceLock Web Page., 2019.
eGovLab., 2019.
EU General Data Protection Regulation (Official Web Page)., 2019.
F., III. Scalise Be. Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare. Vol. Dissertation. Colorado Technical University, 2019.
Hill, Christopher. The Future of British Foreign Policy: Security and Diplomacy in a World After Brexit. Cambridge, UK: Polity Press, 2019.
Gramm-Leach-Bliley Act (GLBA) Resources., 2019.
MS, Hwang, Chou YC, Wu CC, and Yang CY. "An Improvement of Tseng–Wu Group Key Exchange Protocol." In Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing. Vol. 752. Singapore: Springer, 2019.
Nelke, Margareta. Information Competence or Infotainment - where are we heading?., 2019.
InnoCenter Bulgaria., 2019.

Pages