• No se han encontrado resultados

Security of Information Resources

Information reconciliation methods in secret key distribution

Information reconciliation methods in secret key distribution

... theory of secrecy systems" [ 108 ] came to light. In words of Robert Gallager "Shannon’s cryptography work can be viewed as changing cryptography from an art to a science" [ 40 ...problem ...

147

Information security in an e-learning environment

Information security in an e-learning environment

... all resources (lectures, students and information) are properly protected against any possible security ...(non-technical) information security countermeasures that could enhance the ...

6

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

... process of the security services for products and services on the Internet of ...the information involved among others. Considering the resources limitations in a Wireless Sensor ...

6

Information Security of a Modern Democratic State: Axiological Context

Information Security of a Modern Democratic State: Axiological Context

... authors of the research focus on the role and significance of values in forming the basis for the information security of a modern democratic ...course of the research, the ...

8

Security of plug-and-play QKD arrangements with finite resources

Security of plug-and-play QKD arrangements with finite resources

... roots of humanity. To provide secure communications without the flaw of being potentially insecure as technology improves, the concept of unconditional security has been ...This ...

18

Indicators Of Financial Security Of Small And Medium Enterprises

Indicators Of Financial Security Of Small And Medium Enterprises

... importance of the financial security of an ...stability of small and medium-sized enterprises as an integral part of the economic security of an economic ...functioning ...

8

Movement of financial resources in affiliated SMES

Movement of financial resources in affiliated SMES

... consisting of several affiliated companies, created, as a rule, in the form of non-public joint-stock companies or limited liability companies with no pronounced parent company, however, consisting ...

13

Implementation plan for an ISMS according to ISO/IEC 27001:2013

Implementation plan for an ISMS according to ISO/IEC 27001:2013

... Information security policies Organization of information security Human resource security Asset management Access control Cryptography Physical and environmental security Operations sec[r] ...

23

An information security model based on trustworthiness for enhancing security in on line collaborative learning

An information security model based on trustworthiness for enhancing security in on line collaborative learning

... one of the most influenc- ing paradigms devoted to improving e-Learning ...variety of locations to cooperate with each other by means of a large variety of technological equipment ...explosion ...

122

Teaching Legal English for Company Law: A Guide to Specialism and ELP Teaching Practices and Reference Books

Teaching Legal English for Company Law: A Guide to Specialism and ELP Teaching Practices and Reference Books

... role of grammar instruction in a communicative ...Journal of Language Teaching, 25(1), 9-19; Morrow, ...Journal of Teacher Education, 7(2), ...

21

La violencia escolar desde los medios de comunicación y el poder legislativo en México

La violencia escolar desde los medios de comunicación y el poder legislativo en México

... performance of education ...nucleus of what happens at classrooms as expected. This is because translation of regulations into public policies and programs, as well as their subsequent ...

12

Europeana Data Model primer

Europeana Data Model primer

... approach of the Web of Data ("Semantic ...usefulness of the data is encouraged, such as the use of publicly accessible vocabularies (for persons, places, subjects ...

35

Evaluación financiera de las unidades móviles generales de salud de los distritos 05D01 Latacunga, 18D01 Ambato, 06D01 Riobamba, 16D01 Pastaza, de la zona 3: Cotopaxi-Tungurahua-Chimborazo-Pastaza en el período de enero a diciembre 2014

Evaluación financiera de las unidades móviles generales de salud de los distritos 05D01 Latacunga, 18D01 Ambato, 06D01 Riobamba, 16D01 Pastaza, de la zona 3: Cotopaxi-Tungurahua-Chimborazo-Pastaza en el período de enero a diciembre 2014

... First gathering information cost of services provided in the intervention units, financial reports, resources, production and finance collected matrices, then income of infor[r] ...

180

LIS Education and Web Services in the Public Sector  The case of Spain

LIS Education and Web Services in the Public Sector: the Case of Spain

... provider of Web-based job-placement re sources in the fi eld of corporate information management for Spanish graduates in librarianship and information sci- ...instrument of ...

11

Criterio común para evaluaciones de seguridad en tecnologías de la información

Criterio común para evaluaciones de seguridad en tecnologías de la información

... spite of the need to integrate various criteria that existed related to certification security in computer products, emerges Common Criteria for information technology security ...independent ...

9

28 classification schemes of information sciences

28 classification schemes of information sciences

... rationale of the model is based on three basic ...data, information, knowledge ...Second, information is a state of consciousness ...Thus, information is a cognitive/affective process ...

28

The cycle of competitive intelligence as a tool to strengthen the cooperation in the Spanish pharmaceutical industry

The cycle of competitive intelligence as a tool to strengthen the cooperation in the Spanish pharmaceutical industry

... process of Competitive Intelligence (CI) to act against competitors, traditional aim of the ...cycle of CI is used both as to extract offensive and defensive intelligence as cooperative ...results ...

8

Las bibliotecas universitarias en la sociedad del conocimiento  Retos y dinámicas de colaboración bibliotecario profesor : un estudio de caso

Las bibliotecas universitarias en la sociedad del conocimiento Retos y dinámicas de colaboración bibliotecario profesor : un estudio de caso

... inability of a student to cope with university-level work, but it also represents a failure of the institution and the educational system – as well as a lost opportunity to add value to a life and to our ...

606

Life in hybrid reality: problems of psychology and law

Life in hybrid reality: problems of psychology and law

... complexities of the virtual reality legal support lies in the fact that the peculiarity of social relations that Internet users have is transboundary in ...territory of a state; a foreign element is ...

8

Show all 10000 documents...

Related subjects