Мобильная версия

Доступно журналов:

2 361

Доступно статей:

3 493 662


Издательство Taylor&Francis по журналам "Information Systems Security"

Отсортировать по: Порядок: Результаты:

  • Parker Donn B. (Taylor & Francis Group, 1993-01-01)
    Policies, standards, surveys, and assessment questionnaires do not currently provide consistent or complete lists of threats to information for identifying controls, conducting assessments, or establishing priorities in ...
  • Helsing Cheryl W. (Taylor & Francis Group, 1993-01-01)
    Organizations face two issues with respect to the development of business resumption plans: when to start planning and when to stop. The decision to start planning is often made in response to a disaster, and not necessarily ...
  • Parker DonnB. (Taylor & Francis Group, 1994-01-01)
  • Piazza Joseph (Taylor & Francis Group, 1994-01-01)
  • Sobol Michael I. (Taylor & Francis Group, 1993-01-01)
    Those of us in the business of ensuring the integrity of information are increasingly concerned about the amount of sensitive business information that is at the fingertips of more and more users of computer systems. The ...
  • Sobol MichaelI. (Taylor & Francis Group, 1994-01-01)
  • DeMaio Harry B. (Taylor & Francis Group, 1993-01-01)
    Orthodoxy can be both beneficial and destructive. Without a certain amount of orthodoxy in defining security practices and terminology, for example, it would be impossible to develop useful standards. However, orthodoxy ...
  • Lunt Teresa F. (Taylor & Francis Group, 1993-01-01)
    Although a computer system's primary defense is its access controls, it is plain from numerous newspaper accounts of break-ins and computerized thefts that access control mechanisms cannot be relied on in most cases to ...
  • DeMaio Harry (Taylor & Francis Group, 1995-01-01)
  • Hoffman Lance J. (Taylor & Francis Group, 1993-01-01)
    In the Spring 1992 issue of Information Systems Security, John Podesta addressed the FBI's attempt to ensure its ability to eavesdrop on digital communications by imposing a ‘truly radical solution’ on computer software ...
  • Molini James E. (Taylor & Francis Group, 1993-01-01)
    No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an ...
  • DeMaio Harry B. (Taylor & Francis Group, 1993-01-01)
    In my column in the Spring 1992 issue of Information Systems Security, I made a case for integrating the security, quality, and continuity functions. This was less a call for creating a unified organization than for building ...
  • Poore RalphS. (Taylor & Francis Group, 1995-01-01)
  • Неизвестный автор (Taylor & Francis Group, 1992-01-01)
  • Неизвестный автор (Taylor & Francis Group, 1993-01-01)
  • Sobol Michael I. (Taylor & Francis Group, 1992-01-01)
    This column will highlight some of the most significant events taking place in the world of new products directly geared to users of computer systems. As the publisher of ISPNews—INFOSecurity Product News, I have the ...
  • Hal Tipton (Taylor & Francis Group, 1993-01-01)
    In 1977, the Foreign Corrupt Practices Act, which established information integrity requirements for certain corporations, made corporate executives personally liable for violations. In that year, many boards of directors ...
  • Poore RalphS. (Taylor & Francis Group, 1995-01-01)
  • Nelson Karen (Taylor & Francis Group, 1995-01-01)
  • Moeller RobertR. (Taylor & Francis Group, 1994-01-01)