[图书][B] Information security management handbook
HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …
Management Handbook provides an authoritative compilation of the fundamental …
The value of intrusion detection systems in information technology security architecture
H Cavusoglu, B Mishra… - Information Systems …, 2005 - pubsonline.informs.org
The increasing significance of information technology (IT) security to firms is evident from
their growing IT security budgets. Firms rely on security technologies such as firewalls and …
their growing IT security budgets. Firms rely on security technologies such as firewalls and …
[图书][B] Handbook of industrial and systems engineering
AB Badiru - 2005 - books.google.com
Responding to the demand by researchers and practitioners for a comprehensive reference,
Handbook of Industrial and Systems Engineering offers full and easy access to a wide range …
Handbook of Industrial and Systems Engineering offers full and easy access to a wide range …
[图书][B] Surviving security: how to integrate people, process, and technology
A Andress - 2003 - taylorfrancis.com
Previous information security references do not address the gulf between general security
awareness and the specific technical steps that need to be taken to protect information …
awareness and the specific technical steps that need to be taken to protect information …
Cyber-security challenges with smes in developing economies: Issues of confidentiality, integrity & availability (CIA)
EO Yeboah-Boateng - 2013 - vbn.aau.dk
The essence of this study is first to highlight the cyber-security challenges confronting SMEs
in developing economies, and to model a framework for safeguarding their assets, to ensure …
in developing economies, and to model a framework for safeguarding their assets, to ensure …
Decision tree classifiers for computer intrusion detection
X Li, N Ye - Real-time system security, 2003 - dl.acm.org
Intrusion detection is required to protect the security of computer network systems by
detecting intrusive activities occurring in computer network systems. In this paper, we …
detecting intrusive activities occurring in computer network systems. In this paper, we …
Electronic voting: algorithmic and implementation issues
Electronic transactions over the Internet, particularly using the World Wide Web have
become an integral part of economic life. Recently also the public sector has started to use …
become an integral part of economic life. Recently also the public sector has started to use …
A system-fault-risk framework for cyber attack classification
N Ye, C Newman, T Farley - Information Knowledge Systems …, 2006 - content.iospress.com
Computer and network systems fall victim to many cyber attacks of different forms. To reduce
the risks of cyber attacks, an organization needs to understand and assess them, make …
the risks of cyber attacks, an organization needs to understand and assess them, make …
Saldırı tespit ve engelleme araçlarının incelenmesi
Teknolojik gelişmelerle birlikte, yaşanan sayısal bilgi çağında bilgi güvenliğinin önemi gün
geçtikçe artmaktadır. Kişi, kurum ve kuruluşlar açısından bilginin saklanması ve …
geçtikçe artmaktadır. Kişi, kurum ve kuruluşlar açısından bilginin saklanması ve …
[HTML][HTML] Token-based authentication for Hadoop platform
The Hadoop platform has been adopted to process Big Data. The existing authentication
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …