Results 231 to 240 of about 1,662,639 (284)
Some of the next articles are maybe not open access.
Practice-oriented provable-security
1998This short article is intended to complement my talk. I would like to try to introduce you to a certain, relatively new sub-area of cryptography that we have been calling practice-oriented provable-security. It is about applying the ideas of “provably security” to the derivation of practical, secure protocols. I believe it is a fruitful blend of theory
openaire +1 more source
Proceedings of the 6th conference on Information technology education, 2005
The National Strategy to Secure Cyberspace calls upon IT professionals to help empower all Americans to secure their own connections to cyberspace as part of the National security effort. Specifically, it is a call for training the general population (meaning non-IT professionals).
openaire +1 more source
The National Strategy to Secure Cyberspace calls upon IT professionals to help empower all Americans to secure their own connections to cyberspace as part of the National security effort. Specifically, it is a call for training the general population (meaning non-IT professionals).
openaire +1 more source
Practical Lightweight Security
2023Σε αυτήν την εργασία, εξετάζουμε εάν οι Μη Κλωνοποιήσιμες Φυσικές Συναρτήσεις (ΜΚΦΣ) μπορούν να λειτουργήσουν ως μηχανισμοί ασφαλείας που δεν απαιτούν πολλούς υπολογιστικούς πόρους, για πρακτικές εφαρμογές στο πλαίσιο του Διαδικτύου των Πραγμάτων (ΔτΠ).
openaire +1 more source
FRAUDULENT SECURITIES PRACTICES
Journal of the American Medical Association, 1958To the Editor:— During the course of various ininvestigations conducted by the United States Securities and Exchange Commission, it has been reported that a considerable number of the members of the medical profession have been victimized by high-pressure telephone salesmen who have induced doctors, as well as members of other professional groups, to ...
openaire +1 more source
Security backlog in Scrum security practices
2011 Malaysian Conference in Software Engineering, 2011The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventional software development lifecycle to agile development method which can enable them towards speedy delivery of software coping with the ...
Zulkarnain Azham +2 more
openaire +1 more source
2018
The most important design aspect of any architecture is defining the resource security boundaries. In Microsoft Azure, these boundaries are defined at different levels, the topmost being the subscription, followed by resource groups, and then the individual resources.
openaire +1 more source
The most important design aspect of any architecture is defining the resource security boundaries. In Microsoft Azure, these boundaries are defined at different levels, the topmost being the subscription, followed by resource groups, and then the individual resources.
openaire +1 more source
2015
The cloud is changing the way our businesses operate. Business owners, employees, and contractors work anywhere in the world, work at any time of the day, and use many types of devices to access business resources. Business owners are always looking for ways to manage those resources. The question is how to manage these resources in our new cloud-based
openaire +1 more source
The cloud is changing the way our businesses operate. Business owners, employees, and contractors work anywhere in the world, work at any time of the day, and use many types of devices to access business resources. Business owners are always looking for ways to manage those resources. The question is how to manage these resources in our new cloud-based
openaire +1 more source

