Results 311 to 320 of about 5,973,902 (354)
Some of the next articles are maybe not open access.
Information Technology and People, 2013
Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security ...
Cheolho Yoon, Hyungon Kim
semanticscholar +1 more source
Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security ...
Cheolho Yoon, Hyungon Kim
semanticscholar +1 more source
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
, 2016Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world.
B. Gupta, D. Agrawal, S. Yamaguchi
semanticscholar +1 more source
Computer And Information Security Handbook
, 2016Thank you for reading computer and information security handbook. Maybe you have knowledge that, people have look hundreds times for their chosen readings like this computer and information security handbook, but end up in infectious downloads.
semanticscholar +1 more source
Essential Computer Science, 2021
Paul D. Crutcher, N. Singh, Peter Tiegs
semanticscholar +1 more source
Paul D. Crutcher, N. Singh, Peter Tiegs
semanticscholar +1 more source
Computer Security and Risky Computing Practices
Journal of Organizational and End User Computing, 2004Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing ...
Kregg Aytes, Terry Connolly
openaire +2 more sources
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +4 more sources
ACM SIGSAC Review, 1982
Due to the Multiplicity of risks to computer software as well as the time involved and expenses required to provide safety for the programs, protection for a firm's software has become a complex matter. Many security measures have been explored in recent years, especially with regard to general computer facility safety; the location of computer ...
openaire +2 more sources
Due to the Multiplicity of risks to computer software as well as the time involved and expenses required to provide safety for the programs, protection for a firm's software has become a complex matter. Many security measures have been explored in recent years, especially with regard to general computer facility safety; the location of computer ...
openaire +2 more sources
Computer Security Requirements: An Investigation of Computer Security Costs
1976Abstract : A study of the costs associated with the three most popular security problem avoidance techniques provides a lower bound estimate of $3 million per year saving by applying technology. The cost savings estimated appear conservative because of the difficulty in quantifying costs of avoidance methods, and the omission of any consideration of ...
openaire +2 more sources
Cryptography in Computer Security
2019Abstract-One of the major concerns in the use of technology today is the security of information. Organizations invest heavily in information system security to avoid damage and theft of the software, hardware as well as the information contained therein. This process is referred to as computer security or cyber security.
openaire +1 more source
2007
GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist.
openaire +1 more source
GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist.
openaire +1 more source