Results 71 to 80 of about 14,261,936 (322)

Information Security as Strategic (In)effectivity

open access: yes, 2016
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder   +11 more
core   +1 more source

Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios

open access: yesApplied Sciences, 2023
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni   +3 more
doaj   +1 more source

Information security

open access: yesUbiquity, 2006
Nowadays, information is one of the very important assets in almost all organizations. Once the internal networks of those organizations are connected to the Internet, it becomes a potential target for cyber attacks. In order to secure the systems and information, each company or organization should conduct a self-hacking-audit, analyze the threats and
openaire   +2 more sources

Recent Advances in Information Security

open access: yesThe Scientific World Journal, 2014
[No abstract available]
Fei Yu   +4 more
openaire   +6 more sources

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Secure Web-Based Student Information Management System [PDF]

open access: yesarXiv, 2022
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv  

Information Security Fundamentals [PDF]

open access: yes, 2012
Information Security Fundamentals allows security professionals to gain a solid understandings of the foundations of the field and the entire range of issues that practitioners must address.
Thomas R. Peltier, Justin Peltier, John Blackley
core  

The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware [PDF]

open access: yesarXiv, 2013
An approach to the development of security test procedures for information security controls is presented.
arxiv  

Techniques for Enhanced Physical-Layer Security [PDF]

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network.
arxiv   +1 more source

Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]

open access: yesarXiv, 2022
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv  

Home - About - Disclaimer - Privacy