Results 101 to 110 of about 3,727,125 (329)

The Information Security Event Management Systems

open access: yesБезопасность информационных технологий, 2010
The problem of using the information security event management systems in the large commercial organizations for revealing of security threats is considered.
V. V. Filatov
doaj  

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]

open access: yes, 2011
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

ARCSIM Newsletter, February 2024 [PDF]

open access: yes
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core   +1 more source

Theoretical and methodological approaches to assessing the safety and reliability of accounting and analytical information in the system of economic security of enterprises [PDF]

open access: yes, 2015
Subject of research is theoretical and practical aspects of accounting and analytical information in the system of economic security. Subject area is focused on ensuring reliability and accuracy of accounting and analytical information in management ...
Bondar, Mykola, Iershova, Natalia
core  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Development of an Ontology Based Forensic Search Mechanism: Proof of Concept

open access: yesJournal of Digital Forensics, Security and Law, 2006
This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological ...
Jill Slay, Fiona Schulz
doaj  

Home - About - Disclaimer - Privacy