![](images/graphics/blank.gif)
Implementing security
-
In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction.
8p
viambani
18-06-2024
3
1
Download
-
Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.
360p
zizaybay1103
29-05-2024
2
2
Download
-
This book is aimed at architects and developers in the design, implementation, and integration phases of advanced information systems and e-business solutions, developing business processes and dealing with the issues of composition, orchestration, transactions, coordination, and security.
372p
vimeyers
29-05-2024
2
2
Download
-
Ebook Practical information security management: A complete guide to planning and implementation is organized as follows: Chapter 1: evolution of a profession; chapter 2: threats and vulnerabilities; chapter 3: the information security manager; chapter 4: organizational security; chapter 5: information security implementation; chapter 6: standards, frameworks, guidelines, and legislation; chapter 7: protection of information; chapter 8: protection of people; chapter 9: protection of premises; chapter 10: protection of systems; chapter 11: digital evidence and incident response; chapter 12: ...
253p
zizaybay1103
29-05-2024
5
2
Download
-
Based on the interview result, this study introduces a list of pushes and pulls to the supply chain security standard. This contributes to implementation of ISO 28000 in mining industry of Malaysia, specifically Pahang. In the industry, the result of this study is beneficial for supply chain managers and policymakers to ease the ISO implementation and reduce supply chain risks.
4p
longtimenosee10
26-04-2024
6
1
Download
-
This paper is objective to examine the barrier of ISO28000 implementation. As more and more supply chain process faced disruption and delay due to accident, importance of supply chain security management attract the concern from top management of organization. ISO 28000 is a standard that released in 2007 which specify requirement for security management system for the supply chain. However, there are still many organization didn’t apply for this standard.
8p
longtimenosee10
26-04-2024
8
1
Download
-
The paper describes specific aspects of land use planning and forecasting for effective supply chain management. Close attention is paid to the territorial planning projects having been implemented in the United States, England, Germany, the former Soviet Union and Russia. Land is characterized as an object for planning and forecasting as well as the basis for food security. There is a real need for area development planning and forecasting to provide management of agri-food supply chains.
6p
longtimenosee10
26-04-2024
2
1
Download
-
Ebook "Food security governance in the arctic-barents region" provides a multidisciplinary perspective on the major food security and safety challenges faced in the Arctic region. The authors address existing gaps in current knowledge of the coordination and implementation of legal framework and policy that affects the Arctic. The volume is unique in its focus on the Barents region, an area of northern Europe containing Norway, Sweden, Finland and Russia. The region has a population of approximately 5.2 million, including indigenous and non-indigenous peoples.
155p
tracanhphuonghoa1007
22-04-2024
3
2
Download
-
This paper reviews the challenges in implementing Industry 4.0. The literatures found in this paper mainly from Google Scholar, Science Direct and Emerald. In short, the challenges can be imparted into seven major categories. There are data management and Integration, knowledgedriven, process, security, capital, workforce, and education.
8p
longtimenosee09
08-04-2024
6
0
Download
-
The study was carried out on the basis of work with grant of the RFBR No. 19-010-00040 “Interaction between the real and virtual sectors of the economy in order to increase their efficiency and ensure a balance of interests between business, society and the state”. This paper proposed to introduce integrated indicators of the effect of digitalization.
9p
longtimenosee09
08-04-2024
6
2
Download
-
Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.
589p
longtimenosee08
31-03-2024
2
1
Download
-
Ebook "CCNA Security - Official Certification Guide" presents the following content: Part I: Network security concepts, Part II: Constructing a secure infrastructure, Part III: Extending security and availability with cryptography and VPNs, Part IV: Final preparation, Part V: Appendixes.
672p
longtimenosee08
31-03-2024
3
1
Download
-
CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.
776p
longtimenosee08
31-03-2024
2
1
Download
-
In ebook Operating systems: A concept-based approach - Part 2, the following content will be discussed: Chapter 11: memory management, chapter 12: virtual memory, chapter 13: file systems, chapter 14: implementation of file operations, chapter 15: security and protection, chapter 16: distributed operating systems, chapter 17: theoretical issues in distributed systems, chapter 18: distributed control algorithms, chapter 19: recovery and fault tolerance, chapter 20: distributed file systems, chapter 21: distributed system security.
469p
longtimenosee05
31-03-2024
3
0
Download
-
Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 1: about PCI and this book; chapter 2: introduction to fraud, ID theft, and regulatory mandates; chapter 3: why PCI is important; chapter 4: building & maintaining a secure network; chapter 5: protect cardholder data; chapter 6: logging access & events chapter; chapter 7: strong access control.
188p
longtimenosee05
31-03-2024
4
0
Download
-
Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 8: vulnerability management; chapter 9: monitoring and testing; chapter 10: how to plan a project to meet compliance; chapter 11: responsibilities; chapter 12: planning to fail your first audit; chapter 13: you’re compliant, now what.
166p
longtimenosee05
31-03-2024
9
0
Download
-
The study explores the various facets of different wave retail banking models, including their merits, demerits are security issues, to share the wave retail wave banking implementation in Bangladesh. Apart from that, this research evaluates the current status and preparedness of banks to facilitate wave retail banking in Bangladesh. To developed smooth operation and application of wave retail banking in Bangladesh. This research focuses only on renown Banks in Bangladesh.
7p
longtimenosee04
06-03-2024
8
1
Download
-
The article found that enhancing cyber security is a pressing need to improve the future implementation of e-arbitration in Malaysia successfully. Therefore, the article recommended several legal and technical measures to enhance cyber-security in e-arbitration in Malaysia.
5p
longtimenosee04
06-03-2024
7
2
Download
-
Ebook A technical guide to IPSec virtual private networks: Part 1 includes content: Chapter 1: getting started, chapter 2: technical primer, chapter 3: IP security primer, chapter 4: cryptography, chapter 5: implementation theory, chapter 6: authentication, chapter 7: IPSec architecture, chapter 8: security protocols.
185p
longtimenosee03
22-02-2024
4
2
Download
-
Ebook A technical guide to IPSec virtual private networks: Part 2 includes content: Chapter 9: key management, chapter 10: IKE in action, chapter 11: areas of interest within IKE, chapter 12: security policies and the security of VPNs, chapter 13: implementation considerations, chapter 14: product evaluation, chapter 15: report on IPSec.
193p
longtimenosee03
22-02-2024
4
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)