Your search for 15238 returns 3808 document(s) |
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380 |
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Prosiding konferensi nasional e-Indonesia initiatives 2006 Teknologi Informasi & Komunikasi untuk Indonesia Bandung, 3-4 Mei 2006 |
Call Number: SEM-271 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacker launches cyberattack from security site* new bus technology boosts performance* peer-to-peer goes hand to hand, page 23 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394 |
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computers & Security |
Call Number: [2 (1983): 1-3, 3 (1884): 1-4, 4 (1984): 1-4)
, 3 (1984): 1-4)
, 4 (1985): 1-4
, 5 (1986): 1-3, 6 (1987): 3-6, 7 (1988): 1-3; 5-6, 7 (1988): 4; 10 (1990: 1, 9 (1990): 2-7] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security |
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security |
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|