Results 71 to 80 of about 14,261,936 (322)
Information Security as Strategic (In)effectivity
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder+11 more
core +1 more source
Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni+3 more
doaj +1 more source
Nowadays, information is one of the very important assets in almost all organizations. Once the internal networks of those organizations are connected to the Internet, it becomes a potential target for cyber attacks. In order to secure the systems and information, each company or organization should conduct a self-hacking-audit, analyze the threats and
openaire +2 more sources
Recent Advances in Information Security
[No abstract available]
Fei Yu+4 more
openaire +6 more sources
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv
Secure Web-Based Student Information Management System [PDF]
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv
Information Security Fundamentals [PDF]
Information Security Fundamentals allows security professionals to gain a solid understandings of the foundations of the field and the entire range of issues that practitioners must address.
Thomas R. Peltier, Justin Peltier, John Blackley
core
The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware [PDF]
An approach to the development of security test procedures for information security controls is presented.
arxiv
Techniques for Enhanced Physical-Layer Security [PDF]
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network.
arxiv +1 more source
Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv