Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Ken Shaurette"'
Autor:
Ken Shaurette
Publikováno v:
Information Security Management Handbook, Sixth Edition, Volume 4
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8e480e97ff90d560ffe1826f07195afc
https://doi.org/10.1201/ebk1439819029-c12
https://doi.org/10.1201/ebk1439819029-c12
Autor:
Ken Shaurette
Publikováno v:
Information Security Management Handbook, Sixth Edition, Volume 3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4785b99ab3c6d10e7c2e5f343fb2463e
https://doi.org/10.1201/9781420090956-c13
https://doi.org/10.1201/9781420090956-c13
Autor:
Debra Herrmann, Ben Rothke, Robert Slade, Ralph Spencer Poore, Jeff Davis, Todd Fitzgerald, Stephen Fried, Jeff Misrahi, Brian Geffert, Carl Endorf, Jeffrey Davis, Ken Shaurette, Kevin Henry, Ken Buszta, Louis Fried, William Stallings, Mollie Krehnke, David Krehnke, Jim Appleyard, Will Ozier, Sean Price, George McBride, Carl Jackson, Mark Carey, Ray Kaplan, Daniel Houser, Brett Regan Young, Duane Sharp, Matunda Nyanchama, Anna Wilson, Ralph Kliem, Sudhanshu Kairab, Brian Schultz, Carol Siegel, Ty Sagalow, Paul Serritella, John Wylder, Patrick Howard, Felicia Nicastro, Rebecca Herold, Robert Martin, Steven Christey, David Baker, Carl Burney, Jeffrey Fenton, James Wolfe, William Hugh Murray, Ed Skoudis, Edward Freeman, Brian Shorten, Chris Hare, Jon David, Sam Chun, Timothy Stacey, Tom Peltier, William Tompkins, Susan Hansche, Stan Stahl, Charles Hudson, Thomas Bray, Sanford Sherizen, William Boni, Laurie Hill McQuillan, Michael Corby, James Tiller
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77153672f6a1e28bb97406a198d1cabd
https://doi.org/10.1201/noe0849385858.ch3
https://doi.org/10.1201/noe0849385858.ch3
Autor:
Ioana Bazavan, Jay Heiser, Samuel McClintock, Matt Nelson, Sean Scanlon, Polly Perryman Kuver, David C. Krehnke, Satnam Purewal, Ken Shaurette, Ralph Samuel Hoefelmeyer, Ron Moritz, Jonathan Held, Mollie E. Krehnke, Graham Bucholz, Anton Chuvakin, Robert Slade, David K. Bradley, Ian Lim, Adriaan Veldhuisen, Lowell Bruce McCulley, Walter Kobus, William Hugh Murray, Kevin Davidson, Louis Fried, Theresa E. Phillips, Mandy Andress, Mike Prevost, Dencho N. Batanov, David C. Rice, Ben Rothke, Sureerut Inmor, Karen Gibbs, Vatcharaporn Esichaikul, Ed Skoudis, Sushil Jojodia, David Bonewell, James Cannady, Michael Pike, Ravi S. Sandhu, Molly Krehnke, Andres Llana
Publikováno v:
Information Security Management Handbook on CD-ROM, 2006 Edition
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d1ca3a382ac62478b75f38e7d3136b3f
https://doi.org/10.1201/noe0849385858.ch4
https://doi.org/10.1201/noe0849385858.ch4
Autor:
Bonnie Goins, Christopher Pilewski, Matthew Decker, Ken Shaurette, Don Evans, Jeffery Lowder, William Hugh Murray, Stephen Cobb, Chris Hare, Gilbert Held, Mollie Krehnke, David Krehnke, Foster Henderson, Kellina Craig-Henderso
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5a07ad2569a30347684e30eec909b84
https://doi.org/10.1201/noe0849385858.ch6
https://doi.org/10.1201/noe0849385858.ch6
Autor:
Ken Shaurette
Publikováno v:
Information Security Management Handbook, Fifth Edition, Volume 3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::885182eba38b67ecf1113ea53e72ea64
https://doi.org/10.1201/9781420003406.ch19
https://doi.org/10.1201/9781420003406.ch19
Autor:
Ken Shaurette
Publikováno v:
The HIPAA Program Reference Handbook
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc363ef77ca077afd5620e3e2a19f5a8
https://doi.org/10.1201/9780203501283.ch9
https://doi.org/10.1201/9780203501283.ch9
Autor:
Ken Shaurette
Publikováno v:
Information Security Management Handbook, Four Volume Set
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::69fdfb70aa9050c8bd20388f05354989
https://doi.org/10.1201/9780203325438.ch70
https://doi.org/10.1201/9780203325438.ch70
Autor:
Ken Shaurette
Publikováno v:
Information Security Management Handbook, Four Volume Set
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::59c3be6ded85e9fea7cee8ac0f09e09a
https://doi.org/10.1201/9780203325438.ch110
https://doi.org/10.1201/9780203325438.ch110