Spelling suggestions: "subject:"computer networks forminformation technology"" "subject:"computer networks informationation technology""
1 |
Information security policy an investigation into rewriting the policy for Loreto College Msongari /Mwai, Paul Macharia. January 2009 (has links)
Thesis (M.S.S.I.S.)--Regis University, Denver, Colo., 2009. / Title from PDF title page (viewed on Jul. 14, 2010). Includes bibliographical references.
|
2 |
A model for information security control audit for small to mid-sized organisationsDeysel, Natasha January 2009 (has links)
Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
|
3 |
A bandwidth market in an IP network /Lusilao-Zodi, Guy-Alain. January 1900 (has links)
Thesis (MSc)--University of Stellenbosch, 2008. / Bibliography. Also available via the Internet.
|
4 |
Information technology adoption and its impact on employee compensation /Peng, Gang, January 2006 (has links)
Thesis (Ph. D.)--University of Washington, 2006. / Vita. Includes bibliographical references (leaves 99-109).
|
5 |
More connections, less connection an examination of the effects of computer-mediated communication on relationships /McGlynn, Joseph. Byers, Lori A. January 2006 (has links)
Thesis (M.A.)--University of North Texas, Dec., 2006. / Title from title page display. Includes bibliographical references.
|
6 |
Inside out : mapping media : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Arts in Sociology [at the] University of Canterbury /Barclay, Belinda J. M. January 2007 (has links)
Thesis (M. A.)--University of Canterbury, 2007. / Typescript (photocopy). Includes bibliographical references (leaves 152-157). Also available via the World Wide Web.
|
7 |
A cisco-based proposal for ARNe core routing infrastructureJames, Ingrimar. January 2009 (has links)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2009. / Title from PDF title page (viewed on Jul. 14, 2010). Includes bibliographical references.
|
8 |
Models of internet connectivity for secondary schools in the Grahamstown circuit /Brandt, Ingrid Gisélle. January 2006 (has links)
Thesis (M. Sc. (Computer Science))--Rhodes University, 2006.
|
9 |
Building information communication technology infrastructures for econonic developmentPalombo, Domenico. Unknown Date (has links)
Thesis (M.A.)--Duquesne University, 2005. / Title from document title page. Abstract included in electronic submission form. Includes bibliographical references (p. 118-122) and index.
|
Page generated in 0.142 seconds