Results 51 to 60 of about 993,359 (292)

Ensuring information security of cloud storages

open access: yesВопросы безопасности, 2023
The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level.
Natalya Viktorovna Bespalova   +1 more
openaire   +1 more source

House of Security: Locale, Roles and Resources for Ensuring Information Security Research-in-Progress [PDF]

open access: yes, 2006
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians’ view to include information ...
Ang, Wee Horng   +7 more
core  

Правові аспекти формування системи безпеки об’єктів критично важливої інформаційної інфраструктури в Україні [PDF]

open access: yes, 2018
The emergence of the new types of crimes in the field of using electronic counting machines (computers), computer systems and networks and telecommunication networks makes the problem of protecting critically important information infrastructure relevant,
Kovaliv, Myroslav   +3 more
core   +3 more sources

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Information Security in the System of Ensuring National Security

open access: yesWISDOM, 2017
As a system-building factor for a modern and dynamically developing society, the information sphere significantly influences the political, economic, cultural, protective, and ideological general state and elements of the states', nations' and individuals' life security, which highlights the importance of information security in the national security ...
openaire   +2 more sources

Pharmacological inhibition of the PERK pathway modulates hepatocellular carcinoma growth and immune signaling

open access: yesFEBS Open Bio, EarlyView.
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero   +5 more
wiley   +1 more source

The problem of classifying sources of threats to information security

open access: yesАналітично-порівняльне правознавство
The article considers scientific approaches to classifying sources of threats to information security. A synthesized summary of the components of information security in the context of compliance with national security requirements showed possible ...
M. V. Honcharov
doaj   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

On the issue of researching ways to improve information security in Ukraine

open access: yesАналітично-порівняльне правознавство
The article explores the current issues of improving the information security system of Ukraine in the context of modern globalization processes and the growth of information threats.
M. V. Honcharov, A. V. Honcharov
doaj   +1 more source

Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy