Results 151 to 160 of about 3,109,144 (196)
Some of the next articles are maybe not open access.
The State of Environmental Security
Capitalism Nature Socialism, 2003(2003). The State of Environmental Security. Capitalism Nature Socialism: Vol. 14, No. 1, pp. 124-132.
openaire +1 more source
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Software-intensive systems are increasingly pervading our everyday lives. As they get more and more connected, this opens them up to far-reaching cyber attacks. Moreover, a recent study by the U.S. Department of Homeland Security shows that more than 90% of current cyber-attacks are enabled not by faulty crypto, networks or hardware but by application ...
openaire +1 more source
Software-intensive systems are increasingly pervading our everyday lives. As they get more and more connected, this opens them up to far-reaching cyber attacks. Moreover, a recent study by the U.S. Department of Homeland Security shows that more than 90% of current cyber-attacks are enabled not by faulty crypto, networks or hardware but by application ...
openaire +1 more source
SSRN Electronic Journal, 2012
The current conflict between the jihadi extremists and the liberal democratic nations of the west has brought into sharp focus just how much the modern state relies on its intelligence services to defend against terrorist attacks. This was highlighted with the attacks in the U.S.
openaire +1 more source
The current conflict between the jihadi extremists and the liberal democratic nations of the west has brought into sharp focus just how much the modern state relies on its intelligence services to defend against terrorist attacks. This was highlighted with the attacks in the U.S.
openaire +1 more source
The state of information security
Network Security, 2012The past 18 months or so have been marked by an explosion of high-profile cyber-attacks targeting a wide range of prominent organisations across key industries. With so many types of attack to keep track of – Advanced Persistent Threats (APTs), industrialised attacks, insider threats, and so on – it has become difficult to clearly delineate between ...
openaire +1 more source
The Heart of the Matter: The Security of Women and the Security of States
International Security, 2009Does the security of women influence the security and behavior of states? Existing evidence linking the situation of women to state-level variables such as economic prosperity and growth, health, and corruption is fairly conclusive. Questions remain, however, concerning the degree to which state security and state security-related behavior is linked ...
Valerie M. Hudson +4 more
openaire +1 more source
The state of security on the internet
netWorker, 2004How bad is security on the Internet? It seems that almost every day we see reports about new malicious software, and that's just in the popular media. In the specialized news of the computer security world, it's nearly impossible to keep up with the flood of detail about new viruses, worms, spam, spyware, or other attacks against computers on the ...
openaire +1 more source
Secure databases: state of the art
Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083), 2002Most of the relational database management systems (RDBMS) used nowadays provide some limited security mechanisms, and facilities offer capabilities to define roles and establish audit trails. Users of RDBMSs are used to working with discretionary access control (DAC) policies.
M.G. Piattini, E. Fernandez-Medina
openaire +1 more source
2016
Join me for a wild ride through the dizzying highs and terrifying lows of web security in 2015. Take a look at some major breaches of the year, from Top Secret clearances, to medical records, all the way to free beer. We’ll look at how attack trends have changed over the past year and new ways websites are being compromised.
openaire +1 more source
Join me for a wild ride through the dizzying highs and terrifying lows of web security in 2015. Take a look at some major breaches of the year, from Top Secret clearances, to medical records, all the way to free beer. We’ll look at how attack trends have changed over the past year and new ways websites are being compromised.
openaire +1 more source
Conclusion: The Globalization of Security and the Future of the Security State
2009The goal of this book has been to chart the relationship between globalization and security, in order to assess the potential impacts on the ‘security state’. Globalization has had an important impact on security in terms of shifting the organization of state power beyond the national level.
openaire +1 more source
Economic Security in the System of National Security of the State
2023Экономическая безопасность характеризует как состояние соответствующей нации, так и состояние ее хозяйственного комплекса. Это превращает экономическую безопасность в относительно самостоятельное социальное явление, учет которого совершенно необходим при принятии государственным руководством важнейших социально-экономических и военно-политических ...
openaire +1 more source

