Suggested Topics within your search.
Suggested Topics within your search.
Computer security
86
Security measures
38
Computer networks
30
Data protection
18
Thesis
12
Dissertations, Academic
8
Computer crimes
6
Information technology
6
Cryptography
5
Cyberterrorism
5
Access control
4
Business enterprises
4
Computer hackers
4
Computer viruses
4
Handbooks, manuals, etc
4
Management
4
Prevention
4
Computers
3
Firewalls (Computer security)
3
Internet
3
Privacy, Right of
3
Business enterprise
2
Computer
2
Congresses
2
Electronic commerce
2
Electronic mail systems
2
Extranets (Computer networks)
2
Forensic sciences
2
Government policy
2
Malaysia
2
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10“… the proposed model by aligning the cloud computing security with the business strategy and increase…”
Get full text
Get full text
Get full text
Get full text
-
11by Al-Shawabkeh, Mahmoud“…CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy…”
Published 2013
Get full text
Get full text
Get full text
Get full text
-
12“… to investigate the existing practices of computer security controls in four domains namely; (1) data security…”
Get full text
Get full text
-
13by Aliyu, Mansur, Abdallah, Nahel A. O., Lasisi, Nojeem A., Diyar, Dahir, Zeki, Ahmed M.“… who are generally regarded as major violators of computer ethics and computer security. This paper…”
Published 2010
Get full text
Get full text
Get full text
Get full text
-
14
-
15
-
16“…) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension…”
Get full text
Get full text
Get full text
Get full text
-
17“… imitates and demonstrates non consensus in how computer security fits into the satisfaction, success, usage…”
Get full text
Get full text
Get full text
-
18“… imitates and demonstrates non consensus in how computer security fits into the satisfaction, success…”
Get full text
Get full text
Get full text
Get full text
-
19Published 2016Subjects: “…Computer security Congresses…”
-
20