Results 321 to 330 of about 26,049,904 (376)
Some of the next articles are maybe not open access.
2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +1 more source
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +1 more source
Securing Data with Workgroup Security
2004Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire +1 more source
3D Fluorescent Hydrogel Origami for Multistage Data Security Protection
Advanced Functional Materials, 2019Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang +5 more
semanticscholar +1 more source
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +1 more source
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +1 more source
HealthTexas, 1990
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire +3 more sources
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire +3 more sources
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Science China Information Sciences, 2022Siqi Lu +4 more
semanticscholar +1 more source
Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002
Elisa Bertino, FERRARI, ELENA
openaire +2 more sources
Elisa Bertino, FERRARI, ELENA
openaire +2 more sources
IEEE Transactions on Consumer Electronics, 1981
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire +1 more source
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire +1 more source
Data and applications security
Data & Knowledge Engineering, 2002Thuraisingham, Bhavani +1 more
openaire +2 more sources

