Results 231 to 240 of about 1,662,639 (284)
Some of the next articles are maybe not open access.

Practice-oriented provable-security

1998
This short article is intended to complement my talk. I would like to try to introduce you to a certain, relatively new sub-area of cryptography that we have been calling practice-oriented provable-security. It is about applying the ideas of “provably security” to the derivation of practical, secure protocols. I believe it is a fruitful blend of theory
openaire   +1 more source

Practical computer security

Proceedings of the 6th conference on Information technology education, 2005
The National Strategy to Secure Cyberspace calls upon IT professionals to help empower all Americans to secure their own connections to cyberspace as part of the National security effort. Specifically, it is a call for training the general population (meaning non-IT professionals).
openaire   +1 more source

Practical Lightweight Security

2023
Σε αυτήν την εργασία, εξετάζουμε εάν οι Μη Κλωνοποιήσιμες Φυσικές Συναρτήσεις (ΜΚΦΣ) μπορούν να λειτουργήσουν ως μηχανισμοί ασφαλείας που δεν απαιτούν πολλούς υπολογιστικούς πόρους, για πρακτικές εφαρμογές στο πλαίσιο του Διαδικτύου των Πραγμάτων (ΔτΠ).
openaire   +1 more source

FRAUDULENT SECURITIES PRACTICES

Journal of the American Medical Association, 1958
To the Editor:— During the course of various ininvestigations conducted by the United States Securities and Exchange Commission, it has been reported that a considerable number of the members of the medical profession have been victimized by high-pressure telephone salesmen who have induced doctors, as well as members of other professional groups, to ...
openaire   +1 more source

Security backlog in Scrum security practices

2011 Malaysian Conference in Software Engineering, 2011
The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventional software development lifecycle to agile development method which can enable them towards speedy delivery of software coping with the ...
Zulkarnain Azham   +2 more
openaire   +1 more source

Practical Azure Security

2018
The most important design aspect of any architecture is defining the resource security boundaries. In Microsoft Azure, these boundaries are defined at different levels, the topmost being the subscription, followed by resource groups, and then the individual resources.
openaire   +1 more source

Security Best Practices

2015
The cloud is changing the way our businesses operate. Business owners, employees, and contractors work anywhere in the world, work at any time of the day, and use many types of devices to access business resources. Business owners are always looking for ways to manage those resources. The question is how to manage these resources in our new cloud-based
openaire   +1 more source

Secure Working Practices

2013
David Lilburn Watson, Andrew Jones
openaire   +1 more source

Practical Security

Royal United Services Institution. Journal, 1931
openaire   +1 more source

Home - About - Disclaimer - Privacy