<--- Back to Details
First PageDocument Content
Chief financial officer / Chief technology officer / Chief information officer in higher education / Gopal Khanna / Management / Information systems / Chief information officer
Date: 2013-08-31 13:13:20
Chief financial officer
Chief technology officer
Chief information officer in higher education
Gopal Khanna
Management
Information systems
Chief information officer

Add to Reading List

Source URL: media.wiley.com

Download Document from Source Website

File Size: 1,50 MB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Location map Eichenweg 1, Zollikofen Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

DocID: 1xVJL - View Document

Computer law / Artificial intelligence / Trevor Bench-Capon / JURIX / Applications of artificial intelligence to legal informatics / Leon van der Torre / Ambient intelligence / Computer science

LEGAL KNOWLEDGE AND INFORMATION SYSTEMS Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied A

DocID: 1xVqW - View Document

Information theory / Statistical theory / Physics / Probability and statistics / Entropy / Conditional entropy / Principle of maximum entropy

LECTURE 2 Information theory for complex systems Stefan Thurner www.complex-systems.meduniwien.ac.at

DocID: 1xVpK - View Document

Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

DocID: 1xVbf - View Document