Results 311 to 320 of about 5,973,902 (354)
Some of the next articles are maybe not open access.

Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms

Information Technology and People, 2013
Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security ...
Cheolho Yoon, Hyungon Kim
semanticscholar   +1 more source

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

, 2016
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world.
B. Gupta, D. Agrawal, S. Yamaguchi
semanticscholar   +1 more source

Computer And Information Security Handbook

, 2016
Thank you for reading computer and information security handbook. Maybe you have knowledge that, people have look hundreds times for their chosen readings like this computer and information security handbook, but end up in infectious downloads.

semanticscholar   +1 more source

Computer Security

Essential Computer Science, 2021
Paul D. Crutcher, N. Singh, Peter Tiegs
semanticscholar   +1 more source

Computer Security and Risky Computing Practices

Journal of Organizational and End User Computing, 2004
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing ...
Kregg Aytes, Terry Connolly
openaire   +2 more sources

Secure virtualization for cloud computing

Journal of Network and Computer Applications, 2011
Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire   +4 more sources

Security of computer software

ACM SIGSAC Review, 1982
Due to the Multiplicity of risks to computer software as well as the time involved and expenses required to provide safety for the programs, protection for a firm's software has become a complex matter. Many security measures have been explored in recent years, especially with regard to general computer facility safety; the location of computer ...
openaire   +2 more sources

Computer Security Requirements: An Investigation of Computer Security Costs

1976
Abstract : A study of the costs associated with the three most popular security problem avoidance techniques provides a lower bound estimate of $3 million per year saving by applying technology. The cost savings estimated appear conservative because of the difficulty in quantifying costs of avoidance methods, and the omission of any consideration of ...
openaire   +2 more sources

Cryptography in Computer Security

2019
Abstract-One of the major concerns in the use of technology today is the security of information. Organizations invest heavily in information system security to avoid damage and theft of the software, hardware as well as the information contained therein. This process is referred to as computer security or cyber security.
openaire   +1 more source

Security in GRID Computing

2007
GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist.
openaire   +1 more source

Home - About - Disclaimer - Privacy