Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             9 results found
no title author magazine year volume issue page(s) type
1 An extensible analysable system model Probst, Christian W.
2008
13 4 p. 235-246
article
2 Assessing the ‘insider–outsider threat’ duality in the context of the development of public–private partnerships delivering ‘choice’ in healthcare services: A sociomaterial critique Crinson, Iain
2008
13 4 p. 202-206
article
3 Catching the malicious insider Jones, Andy
2008
13 4 p. 220-224
article
4 In a ‘trusting’ environment, everyone is responsible for information security Williams, Patricia A.H.
2008
13 4 p. 207-215
article
5 Information Security management: A human challenge? Ashenden, Debi
2008
13 4 p. 195-201
article
6 Information security management standards: Compliance, governance and risk management Humphreys, Edward
2008
13 4 p. 247-255
article
7 Introduction Coles-Kemp, Lizzie
2008
13 4 p. 193-194
article
8 ISMS insider intrusion prevention and detection Overill, Richard E.
2008
13 4 p. 216-219
article
9 Practical management of malicious insider threat – An enterprise CSIRT perspective Walker, Terrence
2008
13 4 p. 225-234
article
                             9 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands