Amanote Research

Amanote Research

    RegisterSign In

Strengthening Data Security: An Holistic Approach

IASSIST Quarterly
doi 10.29173/iq653
Full Text
Open PDF
Abstract

Available in full text

Date

January 15, 2010

Authors
Sharon BoltonMatthew Woollard
Publisher

University of Alberta Libraries


Related search

Holistic Security Requirements Analysis: An Attacker's Perspective

2015English

Secure Information Assets With Data: An Information Security Governance Framework Using Orchestrated Data Analytics From a Holistic Perspective

2016English

An Holistic View of Information Security: A Proposed Framework

International Journal for Infonomics
2011English

An Holistic Approach to an International Doctoral Program

English

Space Filling Curve for Data Filling: An Embedded Security Approach

Research Journal of Information Technology
Computer Science
2014English

A Holistic Approach for the Architecture and Design of an Ontology-Based Data Integration Capability in Product Master Data Management

IFIP Advances in Information and Communication Technology
Computer NetworksInformation SystemsManagementCommunications
2012English

Data Mining Approach in Security Information and Event Management

International Journal of Future Computer and Communication
2013English

A New Approach for Data Security in Cloud Computing

International Journal of Innovative Research in Computer and Communication Engineering
2015English

Holistic Approach to Fair Value Estimation

2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy