Font Size: a A A
Keyword [technology security]
Result: 61 - 76 | Page: 4 of 4
61. Information technology governance: An exploratory study of the impact of organizational information technology security planning
62. Information technology security risk management
63. Three essays on the law and economics of information technology security
64. An assessment of security vulnerabilities comprehension of cloud computing environments: A quantitative study using the unified theory of acceptance and use
65. A novel neural network based system for assessing risks associated with information technology security breaches
66. The impact of the HIPAA regulation on information technology security in the healthcare industry
67. Exploring failure modes of communication technology security in North Carolina franchised hotels
68. Three essays on information technology security management in organizations
69. The economics of information technology security
70. Understanding and Leveraging Virtualization Technology for Computer Security
71. The Intention to Adopt Cloud Computing Based on Security-as-a-Service Measures Using Technology Acceptance Model (TAM
72. Exploring Information Technology Security Requirements for Academic Institutions to Reduce Information Security Attacks, Breaches, and Threats
73. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience
74. Network Information Technology Security Risk Assessment Of Bank Of Nanjing
75. RFID Security Authentication Protocol Based On Blockchain Technology
76. Cloud Container System Based On Process-level Virtualization And Technology Security Hardware Feature
  <<First  <Prev  Next>  Last>>  Jump to