Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- computer security 11 Treffer
- data protection 9 Treffer
- information technology 9 Treffer
- computer network security 7 Treffer
- information technology security 6 Treffer
-
45 weitere Werte:
- chief technical officers 4 Treffer
- data security failures 4 Treffer
- information resources management 4 Treffer
- security systems 4 Treffer
- cloud computing 3 Treffer
- cyberterrorism 3 Treffer
- electronic commerce 3 Treffer
- information storage & retrieval systems 3 Treffer
- machine learning 3 Treffer
- risk management in business 3 Treffer
- access to information 2 Treffer
- automation 2 Treffer
- back up systems 2 Treffer
- bandwidth allocation 2 Treffer
- computer crimes 2 Treffer
- computer hackers 2 Treffer
- computer hacking 2 Treffer
- conferences & conventions 2 Treffer
- data encryption 2 Treffer
- identity theft 2 Treffer
- imperva inc. 2 Treffer
- internet security 2 Treffer
- medical databases 2 Treffer
- medical records 2 Treffer
- security management 2 Treffer
- standards 2 Treffer
- access control 1 Treffer
- access control of computer networks 1 Treffer
- algorithms 1 Treffer
- and digital transformation 1 Treffer
- application software 1 Treffer
- artificial intelligence 1 Treffer
- bauer, peter 1 Treffer
- big data 1 Treffer
- blocks (toys) 1 Treffer
- bourne, steve 1 Treffer
- business development 1 Treffer
- business enterprise security 1 Treffer
- business enterprises 1 Treffer
- chief information officers 1 Treffer
- cisco systems inc. 1 Treffer
- cloud storage 1 Treffer
- communication infrastructure 1 Treffer
- computer networks 1 Treffer
- computer networks in business enterprises 1 Treffer
Verlag
- techtarget, inc. 9 Treffer
- ap publications, ltd. 8 Treffer
- technologyadvice, llc 5 Treffer
- elsevier b.v. 3 Treffer
- information systems security association, inc. 3 Treffer
-
17 weitere Werte:
- association for computing machinery 2 Treffer
- cyberrisk alliance, llc 2 Treffer
- endeavor business media 2 Treffer
- information today inc. 2 Treffer
- united business media 2 Treffer
- association of records managers & administrators 1 Treffer
- edgell communications inc. 1 Treffer
- haymarket media group ltd 1 Treffer
- informing science 1 Treffer
- jameson publishing 1 Treffer
- mark allen holdings limited 1 Treffer
- metropolis international group ltd. 1 Treffer
- multimedia information & technology 1 Treffer
- omniearth pvt. ltd 1 Treffer
- oxford university press / usa 1 Treffer
- siliconindia inc. 1 Treffer
- west world productions 1 Treffer
Publikation
- database & network journal 5 Treffer
- eweek 5 Treffer
- computer weekly 4 Treffer
- information security 3 Treffer
- issa journal 3 Treffer
-
24 weitere Werte:
- software world 3 Treffer
- communications of the acm 2 Treffer
- health management technology 2 Treffer
- sc magazine: for it security professionals (15476693) 2 Treffer
- storage magazine 2 Treffer
- big data quarterly 1 Treffer
- business solutions 1 Treffer
- computer fraud & security 1 Treffer
- computer technology review 1 Treffer
- computers & security 1 Treffer
- electronics weekly 1 Treffer
- entertainment computing 1 Treffer
- information management journal 1 Treffer
- information security technical report 1 Treffer
- informationweek 1 Treffer
- issues in informing science & information technology 1 Treffer
- itnow 1 Treffer
- multimedia information & technology 1 Treffer
- online searcher 1 Treffer
- open source for you 1 Treffer
- sc magazine: for it security professionals (uk edition) 1 Treffer
- siliconindia 1 Treffer
- varbusiness 1 Treffer
- vertical systems reseller 1 Treffer
Sprache
50 Treffer
-
In: Issues in Informing Science & Information Technology, Jg. 18 (2021), S. 41-61Online academicJournalZugriff:
-
In: Communications of the ACM, Jg. 53 (2010-12-01), Heft 12, S. 48-55Online academicJournalZugriff:
-
In: Information Security, Jg. 12 (2010-02-01), Heft 1, S. 15-18Online serialPeriodicalZugriff:
-
In: SC Magazine: For IT Security Professionals (UK Edition), 2009, S. 18-21Online serialPeriodicalZugriff:
-
In: eWeek, 2021-08-17, S. N.PAGOnline serialPeriodicalZugriff:
-
In: eWeek, 2020-12-01, S. N.PAGOnline serialPeriodicalZugriff:
-
In: eWeek, 2018-02-14, S. 1-1Online serialPeriodicalZugriff:
-
In: ITNOW, Jg. 52 (2010-03-01), Heft 2, S. 11-12Online academicJournalZugriff:
-
In: eWeek, 2014-12-08, S. 1-1Online serialPeriodicalZugriff:
-
In: Information Management Journal, Jg. 48 (2014-07-01), Heft 4, S. 8-8Online serialPeriodicalZugriff:
-
In: eWeek, 2013-08-15, S. 5-5Online serialPeriodicalZugriff:
-
In: Computer Fraud & Security, Jg. 2012 (2012-03-01), Heft 3, S. 16-18serialPeriodicalZugriff:
-
In: Big Data Quarterly, Jg. 3 (2017-06-01), Heft 2, S. 4-5Online serialPeriodicalZugriff:
-
In: VARBusiness, Jg. 23 (2007-02-05), Heft 3, S. 40-43Online serialPeriodicalZugriff:
-
In: Computer Weekly, 2011-01-18, Heft 3, S. 1-1Online serialPeriodicalZugriff:
-
In: Computer Weekly, 2010-11-09, S. 2-2Online serialPeriodicalZugriff:
-
In: Electronics Weekly, 2010-01-27, Heft 2413, S. 33-33Online serialPeriodicalZugriff:
-
In: Computer Weekly, 2008-01-08, S. 65-65Online serialPeriodicalZugriff:
-
In: Business Solutions, Jg. 32 (2016-06-01), Heft 5, S. 7-7serialPeriodicalZugriff:
-
In: Database & Network Journal, Jg. 41 (2011-04-01), Heft 2, S. 22-23serialPeriodicalZugriff: