Results 51 to 60 of about 373,921 (174)
The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Arguing satisfaction of security requirements [PDF]
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B. +3 more
core
Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo +5 more
doaj
Desarrollo de software esteganográfico con criptográfia asociada
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Building Wealth on the Foundation of Employment Portfolio Series [PDF]
[Excerpt] The vision of the U.S. Department of Labor (USDOL) is to advance the economic futures of workers, including those with disabilities. The unique mission of the Office of Disability Employment Policy (ODEP) within USDOL is to promote the ...
National Center on Workforce and Disability/Adult
core +1 more source
A Review of Security Threats by The Unauthorized in The E-Learning
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials.
M. Saleh
semanticscholar +1 more source
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong +2 more
core
Financial Accounting Classification of Cryptocurrency [PDF]
Currently, a large range of opinions exists regarding the appropriate classification and regulation of cryptocurrency. From the legal perspective, some suggest that cryptocurrency investments are too speculative. As a result of this, it is suggested that
Foy, Jonathan
core +1 more source

