Search Results
ArticlesSee all articles results »
From journals and magazines
-
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1dS8MwFA0qIvrgxxQ2pyOC4FPd2qVZKmOwjQ3xSadDfCppkrLBnMNNxH_gz_bmo8WhbC-FQi4Nvbc356Yn5yJ0KQIayEhSj-oShagwgU-KE48kgidSEJ6YQvGZ3b0EDwPW7zoSzdzRKg0v0PzFB4CUTFQVwirUirqbaJP5odWlz9Ot3zBtdaG8ogAVWd0qzGp-c263tOZs60JzPM_4h39ysFlY-gfoPpuSYVVfW1aJ3V9Yoltnuo1rZ3-I9h3IxG0bFUdoQ00LaCfjuBfQ3i8VwmP03Ry13Kkk7SX86FraNaujFra6wbhrmOc6Qm5we4p7r7Ox0RbBmof4hd9SPHC7imDodWBplLijAN-mc8ynEq96RPtTH0iDiZ2gYb_31L31XIMGTwDOW3jc90UQypABTgGfiyRVkC1FonxO05pSUHoTCBGZStlIa42UMqUoUTRSnLA65JMiwoKwWsp0yiUJqdc540pfJNzIEMBlCV1lvouFky3X3TMmMZQv2stx9n5L6CIfObNSHf-MKVr35yMAcGkNNz8qoYpx3QrbchYpsfvQ53GDRBRANQtO15mX0a5lHujtmzO0tXj_UOe2BUUFUHxnWDFx_QP_4fQ8
Mis Quarterly, Volume 34, Issue 3, pp. 523 - 548
Journal Article : Full Text Online
-
Wireless Information-Theoretic Security
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9MT3pwugnO6ezBgwe7tWnSDxgDGQ71pk6Gp5ImGR5kE7f9_77XpMWBAy-lkKSkeXl5eZ8_gGvFYqYzHfsxqSjciAJZSnKfF0oWWnFZlIriLH16Z88v6WTcgNs6F8YYUwafmT69lr58vVQbMpUNyEmIAnwP9pIssLlatceAi9BWBg-RgVHncGV8wiAbTB-nNmgyQ_YkHMlfEqiEVKGASLnCNZlbMIvtc5k5YTNpwqyaZhlp3beRJtbmsBWCXdVy_O8fHcORu396d3bDnEDDLFrQrLAdPMfqLTj8VaiwDYKCZD_xUPSGHyOXwUQUHQ4-Rv60yoWkxleHh0ctp_A2uZ-OH3wHuOArFNxrXxulmSxUpEKeGJTkikdaCJGgkiYMXeZ0kggdsliZLI1VRuXG5rIwPMLzG9XyM_AUT4N5SkcoL3gUyVQaeuiCPoWXxQ70q9XPlStDTmgYn3mpjgRZjuSy4JiWXB24qQd82Qocu7u2aYnrbm51O9DbIm_dzgJOebc4rlvRO3csvMqp6g4jwIcOXNWtyHvkUJELs9ys8ognZJHB8d6OHim5iVkikvO_p9aFAxuAQmadC9hff2_MpcWl6JX7-weZu_lA
Ieee Transactions On Information Theory, Volume 54, Issue 6, pp. 2515 - 2534
Journal Article : Full Text Online
-
Fear Appeals and Information Security Behaviors: An Empirical Study
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1bS8MwFA4qIvrgZQqb0xFB8KnaJmmayhjMsSF78jbEp5I2GRvMMdb54L_3pEmLA3EUCoUTCOfk8p3my3cQus4IJypW3OMmRWE6TGFKSeaxNJOpyphMi0TxXQw_yPOLGPQciSZ3tMqCF1ic4gNASmf6DoZV6HNzR31bBKHVpa-W2yAqyupCesUBKgpqFWYNv7lqt7bn7JpEc5qX_MP1NZi6jWVwhJ7KLhWs6lvLKrH_F9bo1qVu48beH6NDBzJx146KE7Sl5zW0V3Lca-jglwrhKRoCDFxigKOAGXMs5wq3Jx13TcmEDb-6Gnftu0kHO0HFZX6Pu3Pc_1xMC5ERbAiJ32doNOi_9R49V2LByygNV15IeQpbNMsUH_tkzEQsZWielIBbAZ1RJQMlSKYpJLMRk4xoEsW-DojmPlG0jnDGhD8WZtFkKaNUCqnNS8GHCgEeNtBN6f0kc8Ljpv7FLIEExMQpKT3UQFeV5cKKbfxhU7cBrCwAMvmMMsIaqFU4_5-2zTLWiZuqeRKxmBvFofh8U_Mm2rfcAcMwu0A7q-WXvrRFJFqAwx9GrWJk_gAzNtsm
Mis Quarterly, Volume 34, Issue 3, pp. 549 - 566
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Information security.
https://find.library.duke.edu/catalog/DUKE001008313
Book, Government publication
This item is currently Available Goodson Law Library, J 25.2:In 3 c.1
-
Information security : comments on the proposed Federal Information Security Management Act of 2002
https://find.library.duke.edu/catalog/UNCb4376716
Book, Government publication : View Online
-
IET information security.
https://find.library.duke.edu/catalog/DUKE99119250514308501
Journal, Magazine, or Periodical : View Online
Our WebsiteSee all website results »
Guides, policies, news more
-
A PSA on Password Security
https://dukelawref.blogspot.com/2009/04/psa-on-password-security.html
Now might be a good time to review the Duke Office of Information Technology’s Password Security FAQ ( (...)
-
Security blankets? - Scholarly Communications @ Duke
https://blogs.library.duke.edu/scholcomm/2008/12/12/security-blankets/
Security blankets? - Scholarly Communications @ Duke Primary Menu Skip to content About What we do For Faculty Authors Copyright in (...)
-
Staffing and Contact Information | Duke University Libraries
https://library.duke.edu/data/about/staff
Staffing and Contact Information | Duke University Libraries Skip to main content My Accounts Ask a Librarian Library Hours Search our (...)
Collection GuidesSee all collection guides results »
Detailed inventories of archival collections
-
Information security, 1985-1988
https://archives.lib.duke.edu/catalog/sanford_aspace_ref2431_z64
In: Terry Sanford papers, 1926-1996 » Legislative Files Series, 1986-1992 » Foreign Relations Subseries, 1986-1992 » Defense, 1986-1992 -
Security information
https://archives.lib.duke.edu/catalog/fwhcrecords_aspace_ref1190_6a5
In: Feminist Women's Health Center records, 1973-2003 and undated » Subject Files Series, 1977-2003 » Anti-Abortion Violence, 1985-1991 -
Social Security information
https://archives.lib.duke.edu/catalog/johnstonwaltere_aspace_ref109_aak
In: Walter Eugene Johnston papers, 1980-1982 » Committee Files, 1980-1982 » Ways and means
Archival MaterialsSee all archival materials results »
Manuscripts and archival materials
-
Performance analysis of secure information communication using the transport layer security (...)
https://find.library.duke.edu/catalog/DUKE002596909
Archival and manuscript material, Book
Check Holdings for this item's availability Library Service Center, University Archives
-
Private information acquisition, manipulation and trading equilibrium
https://find.library.duke.edu/catalog/DUKE002609638
Archival and manuscript material, Book
Check Holdings for this item's availability University Archives, Library Service Center
-
Critical role of animal science research in food security and sustainability
https://find.library.duke.edu/catalog/DUKE006531835
Archival and manuscript material, Book
Check Holdings for this item's availability Perkins & Bostock Library, RA601 .N383 2015
Some materials and descriptions may include offensive content. More info