Showing 1 - 10 of 89
User-provided connectivity (UPC) services offer a possible alternative, orcomplement, to existing infrastructure …-based connectivity. A userallows other users to occasionally connect through its "home base" inexchange for reciprocation, or possibly … attractive, as it offers more connectivity options toroaming users, but it also implies a greater volume of (roaming …
Persistent link: https://www.econbiz.de/10009481232
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information...
Persistent link: https://www.econbiz.de/10009459007
Identity and access management is rapidly becoming the top business issue asorganizations look to increase security, reduce risk and decrease operational costs. In order toevaluate adequately the emerging maze of technologies brought forward by variousvendors it is necessary to critically...
Persistent link: https://www.econbiz.de/10009463253
The aim of this research paper is to analyse the individual and collective informationsecurity risks which could arise from using a security strategy model (SSM); the objective of creatingthe SSM was so as to protect a wireless local area network (WLAN). As such the focus of this papershall be...
Persistent link: https://www.econbiz.de/10009463258
In order to improve the security of customer data, the credit card companies have come together to create a security standard, called Payment Card Industry Data Security Standard (PCI DSS), which involve mandatory requirements for merchants that accept credit card transactions. All restaurants...
Persistent link: https://www.econbiz.de/10009468069
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with...
Persistent link: https://www.econbiz.de/10009475049
The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing individuals' concerns regarding online disclosure of personal...
Persistent link: https://www.econbiz.de/10009475081
Darbo tikslas – išnagrinėti būdus darbo kompiuteriu keliamoms grėsmėms valdyti: (1) Aptarti, pažinti grėsmes kompiuterinių sistemų saugumui; (2) Suprasti, kas sukelia šias grėsmes, nagrinėjant programinės įrangos kūrimo procesą; (3) Nustatyti būdus, kurie gali sumažinti ar...
Persistent link: https://www.econbiz.de/10009478729
As the primary vehicle for most organized cybercrimes, malicious software (or malware) has become one of the most serious threats to computer systems and the Internet. With the recent advent of automated malware development toolkits, it has become relatively easy, even for marginally skilled...
Persistent link: https://www.econbiz.de/10009482946
experiment networks, remote users are provided with the tools needed to do experiments in a reproducible and secure environment. …
Persistent link: https://www.econbiz.de/10009451265