Results 131 to 140 of about 38,187 (179)
Some of the next articles are maybe not open access.
Social Science Computer Review, 2006
Recent developments in U.S. privacy and security policy are traced, including coverage of the renewal of the PATRIOT Act, the domestic spying affair of 2005 to 2006, passage of the Real ID Act, and other developments associated with the Department of Homeland Security. Threats to democratic values are assessed.
openaire +1 more source
Recent developments in U.S. privacy and security policy are traced, including coverage of the renewal of the PATRIOT Act, the domestic spying affair of 2005 to 2006, passage of the Real ID Act, and other developments associated with the Department of Homeland Security. Threats to democratic values are assessed.
openaire +1 more source
Journal of Transnational Management Development, 2002
ABSTRACT Security and related contingency recovery plans ensure a business' survival when it is faced with potential information systems breakdowns. Its primary objective is to prevent a calamity from occurring and to limit the impact of destructive events related to computer-based information systems. Most disaster recovery plans, when put into effect,
Ata Nahouraii +4 more
openaire +1 more source
ABSTRACT Security and related contingency recovery plans ensure a business' survival when it is faced with potential information systems breakdowns. Its primary objective is to prevent a calamity from occurring and to limit the impact of destructive events related to computer-based information systems. Most disaster recovery plans, when put into effect,
Ata Nahouraii +4 more
openaire +1 more source
Secure Virtual Application Distribution
2009 International Conference on Computer Technology and Development, 2009This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in ...
Wira Zanoramy A. Zakaria +4 more
openaire +1 more source
Virtualization Sparks Security Concerns
Computer, 2008Virtualization is rapidly becoming a standard technology for businesses. The technology lets a single PC or server simultaneously run multiple operating systems or multiple sessions of a single OS. The approach is thus becoming a common way for users to optimize their hardware utilization by maximizing the number and kinds of jobs a single CPU can ...
openaire +1 more source
2003
La théorie des options réelles, qui permet d'évaluer des investissements ou encore de résoudre des problèmes de temps optimal d'investissement, est fondée sur l'existence d'un actif sous-jacent négocié pertinent. En l'absence d'un tel sous-jacent, il est possible de construire un portefeuille d'actifs négociés qui joue le rôle d'un sous-jacent virtuel (
Kast, A. +3 more
openaire +1 more source
La théorie des options réelles, qui permet d'évaluer des investissements ou encore de résoudre des problèmes de temps optimal d'investissement, est fondée sur l'existence d'un actif sous-jacent négocié pertinent. En l'absence d'un tel sous-jacent, il est possible de construire un portefeuille d'actifs négociés qui joue le rôle d'un sous-jacent virtuel (
Kast, A. +3 more
openaire +1 more source
Virtual Environment Security Modeling
2010Virtualization allows to manage a lot of properties of computer systems including the security of information processing. Goal of this investigation is to state conditions of the ability of virtualization mechanism to guarantee satisfying of the security policy.
Dmitry Zegzhda, Ekaterina Rudina
openaire +1 more source
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi +2 more
exaly
Cloud Security and Virtualization
As organizations increasingly adopt cloud computing and virtualization technologies to enhance flexibility, scalability, and cost-efficiency, concerns about security have become paramount. This abstract explores the intersection of cloud security and virtualization, addressing the challenges and strategies for ensuring robust data protection in this ...Su Panda, Priyanshu +2 more
openaire +1 more source

