Search Results - Human information processing.
Suggested Topics within your search.
Suggested Topics within your search.
- Cognition 2
- Information technology 2
- COMPUTERS / Security / General 1
- Child care 1
- Computer networks 1
- Computer security 1
- Congresses 1
- Congrsses 1
- Data processing 1
- Data protection 1
- Electronic commerce 1
- Helplines 1
- Human capital 1
- Human information processing 1
- Human information procssing 1
- Information services 1
- Information storage and retrieval systems 1
- Intangible property 1
- Learning, Psychology of 1
- MEDICAL / Ethics 1
- Management 1
- Management information systems 1
- Medical ethics 1
- Mobile computing 1
- PHILOSOPHY / Ethics & Moral Philosophy 1
- Personnel management 1
- Security measures 1
- Strategic planning 1
- Web services 1
- World Wide Web 1
-
1
-
2
-
3
-
4
-
5
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
6
Web information systems and technologies : 10th International Conference, WEBIST 2014, Barcelona, Spain, April 3-5, 2015 : revised selected papers /
Published 2015Inhaltstext
Conference Proceeding Book -
7
Strategy maps : converting intangible assets into tangible outcomes /
Published 2004Table of Contents: “…Strategy maps -- Operations management processes -- Customer management processess --Innovation processes -- Regulatory and social processes -- Aligning intangible assets to enterprise strategy -- Human capital readiness -- Information capital readiness -- Organization capital readiness -- Customizing your strategy map to your strategy -- Planning the campaign -- Private-sector organizations -- Public-sector organizations -- Nonprofit organizations.…”
Table of contents
Book -
8