Results 51 to 60 of about 373,921 (174)

The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]

open access: yes, 2014
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core  

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Arguing satisfaction of security requirements [PDF]

open access: yes, 2006
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B.   +3 more
core  

Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja

open access: yesMaskana, 2017
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo   +5 more
doaj  

Desarrollo de software esteganográfico con criptográfia asociada

open access: yesMaskana, 2017
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj  

Introduction to Security Onion [PDF]

open access: yes, 2016
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core  

Building Wealth on the Foundation of Employment Portfolio Series [PDF]

open access: yes, 2007
[Excerpt] The vision of the U.S. Department of Labor (USDOL) is to advance the economic futures of workers, including those with disabilities. The unique mission of the Office of Disability Employment Policy (ODEP) within USDOL is to promote the ...
National Center on Workforce and Disability/Adult
core   +1 more source

A Review of Security Threats by The Unauthorized in The E-Learning

open access: yes, 2015
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials.
M. Saleh
semanticscholar   +1 more source

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Financial Accounting Classification of Cryptocurrency [PDF]

open access: yes, 2019
Currently, a large range of opinions exists regarding the appropriate classification and regulation of cryptocurrency. From the legal perspective, some suggest that cryptocurrency investments are too speculative. As a result of this, it is suggested that
Foy, Jonathan
core   +1 more source

Home - About - Disclaimer - Privacy