Suggested Topics within your search.
Suggested Topics within your search.
Stock exchanges. Insider trading in securities
16
Investment, capital formation, speculation
15
Security
14
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Privacy
7
Securities. Fixed-income securities
5
Terrorism
5
Bonds
4
Cloud Computing
4
Cloud computing
4
Cloud security
3
Computer networks. General works. Traffic monitoring
3
Digital Forensics
3
Government securities. Industrial securities. Venture capital
3
Information security
3
Investment companies. Investment trusts. Mutual funds
3
Network Security
3
Offenses against public safety. Internal security
3
Cloud Security
2
Computer security. Security measures. Data recovery. Disaster recovery
2
Confidentiality
2
Criminology
2
Customer services. Customer relations
2
Cyber Security
2
Cybersecurity
2
Design Science
2
Digital evidence
2
Food security
2
GDPR
2
Human security
2
-
1
-
2Subjects: “...Information security knowledge sharing; Neo-institutional theory; Security compliance; Security...”
Get fulltext
Others -
3
-
4by Moala, Siumafua I TelaviviSubjects: “...Information security...”
Published 2020
Get fulltext
Others -
5
-
6
-
7Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
8by Adedokun, AdekemiSubjects: “...Impact of cloud security skills...”
Published 2021
Get fulltext
Others -
9by Kamarudin, Nur Khairani, Bismi, Nur Syafiqa, Ahmad Zukri, Nurul Hidayah, Mohd Fuzi, Mohd Faris, Ramle, RashidahSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2020
Get fulltext
View Fulltext in UiTM IR
Article -
10by Abd Halim, Iman Hazwam, Abu Hassan, Nur Muhammad Irfan, Razak, Tajul Rosli, Jamaluddin, Muhammad Nabil Fikri, Ismail, Mohammad HafizSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2019
Get fulltext
View Fulltext in UiTM IR
Article -
11
-
12
-
13Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
14
-
15Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
16
-
17
-
18
-
19
-
20