关注
Rebecca Herold
Rebecca Herold
Adjunct Professor, Norwich University Master of Science, Information Security & Assurance
在 rebeccaherold.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Managing an information security and privacy awareness and training program
R Herold
Auerbach Publications, 2005
1112005
The practical guide to HIPAA privacy and security compliance
R Herold, K Beaver
CRC Press, 2003
982003
Data privacy for the smart grid
R Herold, C Hertzog
Taylor & Francis, 2015
352015
Smart meter data and privacy
R Herold, C Hertzog
Data Privacy for the Smart Grid. Auerbach Publications, 78-97, 2015
212015
The criticality of security in the Internet of Things
R Herold, C Cism
ISACA Journal 6, 18-24, 2015
142015
Addressing privacy issues during disaster recovery
R Herold
Information Security Journal 14 (6), 16, 2006
142006
What is the difference between security and privacy
R Herold
InformationSheild this article was previously published in the CSI July, 2002
122002
The shortcut guide to improving IT service support through ITIL
R Herold
Realtimepublishers. com, 2007
92007
Say what you do: Building a framework of IT controls, policies, standards, and procedures
DJ Cougias, M Halpern, R Herold
Shaser-Vartan, 2007
82007
The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions
R Herold
CRC Press, 2001
82001
Introduction to Computer Ethics
R Herold
Source: http://www. infosectoday. com/Articles/Intro_Computer_Ethics. htm, 2015
72015
10 big data analytics privacy problems
R Herold
72014
Encyclopedia of Information Assurance-4 Volume Set (Print)
R Herold, MK Rogers
CRC Press, 2010
72010
Why information security training and awareness are important
R Herold
Information Systems Security, 2010
62010
Extranet audit and security
R Herold, S Warigon
COMPUT SECUR J 14 (1), 35-40, 1998
61998
Information security and risk management
T Fitzgerald, B Goins, R Herold
Official (ISC) 2 Guide to the CISSP CBK, 36-127, 2016
52016
HIPAA enforcement getting stronger
R Herold
Search compliance, 2009
52009
Training employees to identify potential fraud and how to encourage them to come forward
R Herold
Information Security Management Handbook, 3 (6), 265-284, 2006
52006
Smart Grid Privacy Concerns
R Herold
Privacy Professor, http: www. privacyguidance. com/files …, 2009
42009
The shortcut guide to IT service management and automation
R Herold
Realtimepublishers. com, 2008
32008
系统目前无法执行此操作,请稍后再试。
文章 1–20