Security of the information

Top PDF Security of the information:

Las políticas de Seguridad en el Magreb desde la perspectiva del realismo ofensivo

Las políticas de Seguridad en el Magreb desde la perspectiva del realismo ofensivo

... terms of geographical size, population and the size of their economy, their military power and their ability to influence, are competing for a position of regional ...leadership. The ...

32

Report of the Working Group on the use of mercenaries as a

Report of the Working Group on the use of mercenaries as a

... to the facts mentioned, the Working Group welcomed information concerning: (a) the legal status of private military and/or security contractors of United States-registered ...

18

RELATIONSHIP BETWEEN INFORMATION SECURITY BEHAVIOR AND SATISFACTION DEGREE OF PSYCHOLOGICAL NEEDS AND THE MEDIATION EFFECT OF TEAM EFFECTIVENESS AND ORGANIZATIONAL COMMITMENT

RELATIONSHIP BETWEEN INFORMATION SECURITY BEHAVIOR AND SATISFACTION DEGREE OF PSYCHOLOGICAL NEEDS AND THE MEDIATION EFFECT OF TEAM EFFECTIVENESS AND ORGANIZATIONAL COMMITMENT

... to the wishes of corporate ...degree of satisfaction, and they will have the internal motivation to take the initiative to take responsibility and face the challenges at work ...

11

Information reconciliation methods in secret key distribution

Information reconciliation methods in secret key distribution

... theory of secrecy systems" [ 108 ] came to light. In words of Robert Gallager "Shannon’s cryptography work can be viewed as changing cryptography from an art to a science" [ 40 ...applied ...

147

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

... spots: The parts that you generally don’t change in any instantiation of the ...Define the overall architecture, the basic components and relationships between them, the ...

56

A Multiagent Approach to Outbound Intrusion Detection

A Multiagent Approach to Outbound Intrusion Detection

... way of limiting the extension of the damage an intruder may cause and constitutes the foundation of a type of security tools whose objective is to protect ...

224

Analysis of threats to the security of EPC networks

Analysis of threats to the security of EPC networks

... loss of revenue to company A. Since this threat represents for the attacker a disruption rather than a clear opportunity for gain, we rate the motivation for this threat as ...Regarding the ...

8

Information security in an e-learning environment

Information security in an e-learning environment

... Information security is adequately addressed within a traditional environment due to the fact that traditional education environments are mostly restricted to one physical ...as the databases ...

6

AAQ2139

AAQ2139

... Further, the development of IT Management Guidelines has taken C OBI T to the next level-providing management with Key Goal Indicators (KGIs), Key Performance Indicators (KPIs), Critical Success ...

293

Design and technical evaluation of an enhanced location-awareness service enabler for spatial disorientation management of elderly with mild cognitive impairment

Design and technical evaluation of an enhanced location-awareness service enabler for spatial disorientation management of elderly with mild cognitive impairment

... Thus, the list of contacts and the security-areas structure is extracted allowing the enabler to subscribe to contacts' presence information (step 4 and 6). The enabler will distinguis[r] ...

7

The Experience of Security in Mathematics

The Experience of Security in Mathematics

... 1995). The interviewer ap- proached the topic indirectly, by discussing with the participants their relationship with mathematics in a general ...minimised the risk of participant ...

10

On the Security of Cache Algorithms

On the Security of Cache Algorithms

... represent the leakage of one single cache set that stores all the memory blocks (one line per cache algorithm) and the dashed line represents the absorption of as many cache sets ...

118

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

... process of the security services for products and services on the Internet of ...inputs the service context, the legislative diversity and the information ...

6

EFFECTS OF SANCTION ON THE MENTALITY OF INFORMATION SECURITY POLICY COMPLIANCE

EFFECTS OF SANCTION ON THE MENTALITY OF INFORMATION SECURITY POLICY COMPLIANCE

... was the most appropriate method for this study for the following ...on information security violations are hard to obtain due to ...keep information security incident data ...

11

The Concept of Food and Nutrition Security

The Concept of Food and Nutrition Security

... At the macro level, precipitation records can predict future food ...provide information on food availability at national level. The World Food Programme (WFP) developed the Vulnerability ...

28

Life in hybrid reality: problems of psychology and law

Life in hybrid reality: problems of psychology and law

... detail, the content of Russian Federation national interests in the information sphere is disclosed by the section II of the Doctrine under consideration, which is ...

8

Information Security of a Modern Democratic State: Axiological Context

Information Security of a Modern Democratic State: Axiological Context

... Maple, information (computer) literacy is a key element in ensuring information ...security. The improvement of the level of users’ awareness requires high-quality ...

8

Topological assessment in the determination of the security of the electricity grid infrastructure

Topological assessment in the determination of the security of the electricity grid infrastructure

... algorithm of Hierarchical Islanding of power systems based on the spectral graph theory has been developed as a security strategy to mitigate grid impactive events such as cascading ...

98

Indicators Of Financial Security Of Small And Medium Enterprises

Indicators Of Financial Security Of Small And Medium Enterprises

... reveals the importance of the financial security of an ...At the same time, the authors consider the financial stability of small and medium-sized ...

8

Informe d'Autors UOC a ISI Web of Knowledge  Maig 2012

Informe d'Autors UOC a ISI Web of Knowledge Maig 2012

... using the FFT transform. Paper presented at the Advances in Information Security and its Application; Communications in Computer and Information Science; 3rd International Conference on ...

5

Show all 10000 documents...