Information Security
EFFECTS OF SANCTION ON THE MENTALITY OF INFORMATION SECURITY POLICY COMPLIANCE
11
Information security in an e-learning environment
6
An information security model based on trustworthiness for enhancing security in on line collaborative learning
122
Information Security of a Modern Democratic State: Axiological Context
8
Diseño de un manual de procedimientos del sistema contable en la empresa Fevecomex S A S Basado en la norma técnica colombiana para la seguridad de la información NTC ISO / IEC 27001 / 2006 (Information technology Security techniques Information security management systems Requirements)
78
Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona
56
Life in hybrid reality: problems of psychology and law
8
Quantitative assessment and comparison of cloud service providers' privacy practices
8
Marco para el Gobierno de la Seguridad de la Infornación en servicios Cloud Computing.
310
PseudoRandomSequencesPy Library v 1.0.
11
Informe d'Autors UOC a ISI Web of Knowledge Maig 2012
5
Implementation plan for an ISMS according to ISO/IEC 27001:2013
23
Lab - Configuring an Intrusion Prevention System (IPS) Using the CLI and CCP (Instructor Version)
53
Lab - Securing the Router for Administrative Access (Instructor
61
Lab - (Optional) Configuring a Remote Access VPN Server and Client (Instructor Version)
30
Lab - CCNA Security Comprehensive Lab (Instructor Version)
75
Chapter 10 Lab H: Configuring a Site-to-Site IPsec VPN using CCP on an ISR and ASDM on an ASA 5510 (Instructor Version)
43
Lab - Configuring Zone-Based Policy Firewalls (Instructor Version)
35
Lab - Securing Administrative Access Using AAA and RADIUS
35
Lab - Configuring ASA Basic Settings and Firewall Using ASDM
47