Implementation principles of the project management by a security systems design

被引:0
|
作者
Reitspis, Josef [1 ]
Kormancova, Gabriela [1 ]
机构
[1] Department of Security Management, Faculty of Special Engineering, University of Žilina, Slovakia
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:45 / 48
相关论文
共 50 条
  • [1] Design, Implementation and Migration of Security Systems as an Extreme Project
    Scharmer, Carol
    Trujillo, David
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 211 - 217
  • [3] Project Management System Design and Implementation
    Ju, Li
    Jing, Wang
    Xu Wenbin
    Lu Zhenhua
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2012), VOL 4, 2012, : 19 - 22
  • [4] How to Prevent Reinventing the Wheel? - Design Principles for Project Knowledge Management Systems
    Schacht, Silvia
    Maedche, Alexander
    DESIGN SCIENCE AT THE INTERSECTION OF PHYSICAL AND VIRTUAL DESIGN, 2013, 7939 : 1 - 17
  • [5] Design and implementation of a security layer for RFID systems
    Alarcon-Aquino, V.
    Dominguez-Jimenez, M.
    Ohms, C.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2008, 6 (02) : 69 - 83
  • [6] An Approach for Implementation of Project Management Information Systems
    Berzisa, Solvita
    Grabis, Janis
    INFORMATION SYSTEMS DEVELOPMENT: TOWARDS A SERVICE PROVISION SOCIETY, 2009, : 423 - 431
  • [7] Using Agile Project Management in the Design and Implementation of Activity-Based Costing Systems
    Jimenez, Victor
    Afonso, Paulo
    Fernandes, Gabriela
    SUSTAINABILITY, 2020, 12 (24) : 1 - 23
  • [8] Design and implementation principles for integrated network and system management
    Knahl, Martin H.
    WEBIST 2007: Proceedings of the Third International Conference on Web Information Systems and Technologies, Vol IT: INTERNET TECHNOLOGY, 2007, : 418 - 421
  • [9] Design and implementation of an open network security management platform
    Cao, Yuan-Da
    Wang, Yong
    Journal of Beijing Institute of Technology (English Edition), 2002, 11 (03): : 316 - 320
  • [10] The Design and Implementation of Data Security Management and Control Platform
    Zou, Hong
    Qian, Yang
    Zhao, Yanshuai
    Ding, Kun
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 368 - 378