Results 61 to 70 of about 271,319 (208)
Technical opinion: Information system security management in the new millennium [PDF]
Gurpreet Dhillon, James Backhouse
openalex +1 more source
The Role of User Behaviour in Improving Cyber Security Management. [PDF]
Moustafa AA, Bello A, Maurushat A.
europepmc +1 more source
Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security [PDF]
Gregory R. Ganger, David F. Nagle
openalex +1 more source
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment. [PDF]
Lee Y, Lee GY.
europepmc +1 more source
Background: Health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. The purpose of this study was to determine the factors affecting this motivation.
alireza heidarian +3 more
doaj
Decommissioning of oil and gas assets: industrial and environmental security management, international experience and Russian practice. [PDF]
Khalidov I, Milovidov K, Soltakhanov A.
europepmc +1 more source
Group Security Association (GSA) Management in IP Multicast [PDF]
Thomas Hardjono +2 more
openalex +1 more source
Research and practice on power big data security governance system
The blackmail attacks and data leakage problems of big data had become increasingly serious in recent years,and the state had successively issued a series of relevant laws and regulations to clarify the requirements for big data security work.Power big ...
Hongbin ZHU, Long AN, Mingchen YANG
doaj
Group Security Policy Management for IP Multicast and Group Security [PDF]
Thomas Hardjono, Hugh Harney
openalex +1 more source

