[图书][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

The value of intrusion detection systems in information technology security architecture

H Cavusoglu, B Mishra… - Information Systems …, 2005 - pubsonline.informs.org
The increasing significance of information technology (IT) security to firms is evident from
their growing IT security budgets. Firms rely on security technologies such as firewalls and …

[图书][B] Handbook of industrial and systems engineering

AB Badiru - 2005 - books.google.com
Responding to the demand by researchers and practitioners for a comprehensive reference,
Handbook of Industrial and Systems Engineering offers full and easy access to a wide range …

[图书][B] Surviving security: how to integrate people, process, and technology

A Andress - 2003 - taylorfrancis.com
Previous information security references do not address the gulf between general security
awareness and the specific technical steps that need to be taken to protect information …

Cyber-security challenges with smes in developing economies: Issues of confidentiality, integrity & availability (CIA)

EO Yeboah-Boateng - 2013 - vbn.aau.dk
The essence of this study is first to highlight the cyber-security challenges confronting SMEs
in developing economies, and to model a framework for safeguarding their assets, to ensure …

Decision tree classifiers for computer intrusion detection

X Li, N Ye - Real-time system security, 2003 - dl.acm.org
Intrusion detection is required to protect the security of computer network systems by
detecting intrusive activities occurring in computer network systems. In this paper, we …

Electronic voting: algorithmic and implementation issues

R Kofler, R Krimmer, A Prosser - 36th Annual Hawaii …, 2003 - ieeexplore.ieee.org
Electronic transactions over the Internet, particularly using the World Wide Web have
become an integral part of economic life. Recently also the public sector has started to use …

A system-fault-risk framework for cyber attack classification

N Ye, C Newman, T Farley - Information Knowledge Systems …, 2006 - content.iospress.com
Computer and network systems fall victim to many cyber attacks of different forms. To reduce
the risks of cyber attacks, an organization needs to understand and assess them, make …

Saldırı tespit ve engelleme araçlarının incelenmesi

M Baykara, R Daş - Dicle Üniversitesi Mühendislik Fakültesi …, 2019 - dergipark.org.tr
Teknolojik gelişmelerle birlikte, yaşanan sayısal bilgi çağında bilgi güvenliğinin önemi gün
geçtikçe artmaktadır. Kişi, kurum ve kuruluşlar açısından bilginin saklanması ve …

[HTML][HTML] Token-based authentication for Hadoop platform

M Haggag, MM Tantawy, MMS El-Soudani - Ain Shams Engineering …, 2023 - Elsevier
The Hadoop platform has been adopted to process Big Data. The existing authentication
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …