Rockel et al., 2019 - Google Patents
IT requirements in the real estate sectorRockel et al., 2019
View PDF- Document ID
- 10516413587649746697
- Author
- Rockel G
- Barth L
- Publication year
- Publication venue
- International Journal of Innovative Technology and Exploring Engineering
External Links
Snippet
Digitalization has reached the German real estate market. IT requirements have to be defined and followed. The state, companies and private households must implement appropriate requirements and take measures to jointly guarantee data protection and data …
- 239000000047 product 0 description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pandey et al. | Cyber security risks in globalized supply chains: conceptual framework | |
Saini et al. | Cyber-crimes and their impacts: A review | |
Grama | Legal and privacy issues in information security | |
EP3455777B1 (en) | Cyber-security presence monitoring and assessment | |
Jacobs | Engineering information security: The application of systems engineering concepts to achieve information assurance | |
US20080047016A1 (en) | CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations | |
Kaswan et al. | Cybersecurity law-based insurance market | |
Giri | Cyber crime, cyber threat, cyber security strategies and cyber law in Nepal | |
Rasner | Cybersecurity and third-party risk: Third party threat hunting | |
Thakral et al. | Cybersecurity and ethics for IoT system: a massive analysis | |
Rawal et al. | Cybersecurity and identity access management | |
Jain et al. | Cybersecurity solutions using AI techniques | |
Toth et al. | NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements | |
Denning | Cyber security as an emergent infrastructure | |
Rockel et al. | IT requirements in the real estate sector | |
Efe et al. | It security trends for e-government threats | |
Mitchell | Corporate cyberespionage: identification and prevention part 1 | |
Azhar et al. | N.: Big data security issues: a review | |
Jolly | The secure online Business | |
Hopwood et al. | Security in a Web‐based environment | |
Taneja et al. | Information and data security model: Background, risks, and challenges | |
Bansod et al. | Importance of Cybersecurity and RegTech in FinTech. | |
Alsmadi et al. | IT Risk and Security Management | |
Cobanoglu | A critical look at restaurant network security: attacks, prevention tools, and practices | |
Shi | Incorporating information security in analysis of business strategy: a conceptual framework |