• No se han encontrado resultados

Computer and Information Security

Informe d'Autors UOC a ISI Web of Knowledge  Maig 2012

Informe d'Autors UOC a ISI Web of Knowledge Maig 2012

... in Information Security and its Application; Communications in Computer and Information Science; 3rd International Conference on Information Security and ...

5

Information security in an e-learning environment

Information security in an e-learning environment

... a computer network ...time and cost ...staff and lower cost of campus maintenance, up-to-date information and accessibility ...students and information are in different ...

6

Information Security of a Modern Democratic State: Axiological Context

Information Security of a Modern Democratic State: Axiological Context

... Safa and C. Maple, information (computer) literacy is a key element in ensuring information ...meetings and posters for these purposes showed that they constitute the key methods of ...

8

An information security model based on trustworthiness for enhancing security in on line collaborative learning

An information security model based on trustworthiness for enhancing security in on line collaborative learning

... decade, Computer Supported Collaborative Learning (CSCL) has become one of the most influenc- ing paradigms devoted to improving e-Learning ...time and anywhere [2]. Mobile learning provides ubiquity ...

122

A Guide to MATLAB

A Guide to MATLAB

... product information, and then a MATLABDesktop window will ...bar, and five embedded windows, two of which are hidden. The largest and most important window is the Command Window on the ...use ...

346

Methodology of computer security management for the internet of things

Methodology of computer security management for the internet of things

... objects and devices connected to the internet is growing exponentially, due to the fact that the deployment and design of equipment has been carried out in a very diversified way, since there is no Internet ...

13

Indicators Of Financial Security Of Small And Medium Enterprises

Indicators Of Financial Security Of Small And Medium Enterprises

... Nechaev, and others, devoted to various aspects of the analysis and management of financial stability of economic ...“enterprise security” (Kravchuk & Ushakov, ...“economic security” is ...

8

Informe d'Autors UOC a ISI Web of Knowledge   Març 2011

Informe d'Autors UOC a ISI Web of Knowledge Març 2011

... Industry and ICT Uses as Determinants of Firms' Financial ...BUSINESS, AND TECHNOLOGICAL ASPECTS OF THE KNOWLEDGE SOCIETY PT II, Communications in Computer and Information Science, 112, ...

7

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

... – Frozen spots: The parts that you generally don’t change in any instantiation of the framework. Define the overall architecture, the basic components and relationships between them, the application infrastructure ...

56

Information reconciliation methods in secret key distribution

Information reconciliation methods in secret key distribution

... Csiszar and Körner has been generalized [ 24 ] to quantum settings by replacing the mutual information I( X; Z ) by its quantum counterpart S(X; ...of information are used in this formula because the ...

147

Chapter I  Introduction to Basic Computer Skills, 2019 ppt

Chapter I Introduction to Basic Computer Skills, 2019 ppt

... store information. This device that allows the computer to permanently retain and store data like the operating system, programs and information ...diskette and accesses ...

24

Para descargar el documento haz clic AQUÍ

Para descargar el documento haz clic AQUÍ

... assistants and notebook computers will all be able to interact with Web servers, using standard Internet ...collect information with digital personal assistants that automatically collect the geographic ...

205

Access to new information and communication technologies among homeless people in Madrid (Spain)

Access to new information and communication technologies among homeless people in Madrid (Spain)

... various information and communication technologies –ICTs-(mobile phone, computer, Internet, e-mail and social network site) among a representative sample of homeless people in ...The ...

13

Art – Economic Framework for Pricing and Charging In Digital Libraries – VVAA – 1996

Art – Economic Framework for Pricing and Charging In Digital Libraries – VVAA – 1996

... Digital Libraries will have a major influence on the design of future information systems. They are the cradle from which future advanced information technologies will emerge to provide ...

10

Detection and pattern recognition applied to leaves and chromosomes

Detection and pattern recognition applied to leaves and chromosomes

... plants and that is the reason to have a big database of ...stem and fruit. Leaves of plants are easy to input in a computer as they can be scanned or photographed easily as they are ...nowadays, ...

17

Aeronautical Information Geoservices

Aeronautical Information Geoservices

... [24]) and European ones ([8], [22]) have been taken into ...created and implemented, in such cases where information was available ([1], [2], [3], [11], [19], [20], [33], ...aeronautical ...

9

Aspects and requirements domains applied to computer security

Aspects and requirements domains applied to computer security

... of Security Engineering for computer systems there is still a clear and well- defined methodology on what to implement, how to implement and when to implement through a complete development ...

6

A Multiagent Approach to Outbound Intrusion Detection

A Multiagent Approach to Outbound Intrusion Detection

... Many security systems use monolithic programs to perform in- trusion detection ...programs, and not a population of sample points, to solve a ...normal and abnormal activity is presented to the ...

224

Quantitative assessment and comparison of cloud service providers' privacy practices

Quantitative assessment and comparison of cloud service providers' privacy practices

... Network and Information Security Agency) en la Unión Europea, NIST (National Institute of Standards and Technology) en ...(Cloud Security Alliance) a nivel global, entre otros, llevan ...

8

Show all 10000 documents...

Related subjects