Results 51 to 60 of about 993,359 (292)
Ensuring information security of cloud storages
The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level.
Natalya Viktorovna Bespalova +1 more
openaire +1 more source
House of Security: Locale, Roles and Resources for Ensuring Information Security Research-in-Progress [PDF]
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians’ view to include information ...
Ang, Wee Horng +7 more
core
Правові аспекти формування системи безпеки об’єктів критично важливої інформаційної інфраструктури в Україні [PDF]
The emergence of the new types of crimes in the field of using electronic counting machines (computers), computer systems and networks and telecommunication networks makes the problem of protecting critically important information infrastructure relevant,
Kovaliv, Myroslav +3 more
core +3 more sources
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
Information Security in the System of Ensuring National Security
As a system-building factor for a modern and dynamically developing society, the information sphere significantly influences the political, economic, cultural, protective, and ideological general state and elements of the states', nations' and individuals' life security, which highlights the importance of information security in the national security ...
openaire +2 more sources
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero +5 more
wiley +1 more source
The problem of classifying sources of threats to information security
The article considers scientific approaches to classifying sources of threats to information security. A synthesized summary of the components of information security in the context of compliance with national security requirements showed possible ...
M. V. Honcharov
doaj +1 more source
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
On the issue of researching ways to improve information security in Ukraine
The article explores the current issues of improving the information security system of Ukraine in the context of modern globalization processes and the growth of information threats.
M. V. Honcharov, A. V. Honcharov
doaj +1 more source
Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle +11 more
wiley +1 more source

