4

Information Security Management: A Hierarchical Framework for Various Approaches

Year:
2000
Language:
english
File:
PDF, 127 KB
english, 2000
5

Online banking and identity theft: who carries the risk?

Year:
2004
Language:
english
File:
PDF, 144 KB
english, 2004
6

An Information Security Governance Framework

Year:
2007
Language:
english
File:
PDF, 205 KB
english, 2007
8

Risk analysis modelling with the use of fuzzy logic

Year:
1996
Language:
english
File:
PDF, 890 KB
english, 1996
13

Network Security: Important Issues

Year:
2000
Language:
english
File:
PDF, 368 KB
english, 2000
16

What Makes an Effective Information Security Policy?

Year:
2002
Language:
english
File:
PDF, 234 KB
english, 2002
21

A framework and assessment instrument for information security culture

Year:
2010
Language:
english
File:
PDF, 775 KB
english, 2010
28

An analysis of mother–child interaction patterns in prison

Year:
2003
Language:
english
File:
PDF, 49 KB
english, 2003
33

Information risk assessment, risk analysis and risk management: The IRR research model

Year:
1992
Language:
english
File:
PDF, 685 KB
english, 1992
36

Security and human computer interfaces

Year:
2003
Language:
english
File:
PDF, 800 KB
english, 2003
41

Computer Crime Case Analysis

Year:
2003
Language:
english
File:
PDF, 228 KB
english, 2003
45

Winning hearts and minds: legitimacy in the Namibian war for independence

Year:
2013
Language:
english
File:
PDF, 169 KB
english, 2013
47

Uncovering identities: A study into VPN tunnel fingerprinting

Year:
2006
Language:
english
File:
PDF, 255 KB
english, 2006
48

The Kalahari Ecosystem

Year:
1984
File:
PDF, 4.23 MB
1984
50

Information security: The moving target

Year:
2009
Language:
english
File:
PDF, 633 KB
english, 2009