intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Implementing security

Xem 1-20 trên 549 kết quả Implementing security
  • In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction.

    pdf8p viambani 18-06-2024 3 1   Download

  • Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.

    pdf360p zizaybay1103 29-05-2024 2 2   Download

  • This book is aimed at architects and developers in the design, implementation, and integration phases of advanced information systems and e-business solutions, developing business processes and dealing with the issues of composition, orchestration, transactions, coordination, and security.

    pdf372p vimeyers 29-05-2024 2 2   Download

  • Ebook Practical information security management: A complete guide to planning and implementation is organized as follows: Chapter 1: evolution of a profession; chapter 2: threats and vulnerabilities; chapter 3: the information security manager; chapter 4: organizational security; chapter 5: information security implementation; chapter 6: standards, frameworks, guidelines, and legislation; chapter 7: protection of information; chapter 8: protection of people; chapter 9: protection of premises; chapter 10: protection of systems; chapter 11: digital evidence and incident response; chapter 12: ...

    pdf253p zizaybay1103 29-05-2024 5 2   Download

  • Based on the interview result, this study introduces a list of pushes and pulls to the supply chain security standard. This contributes to implementation of ISO 28000 in mining industry of Malaysia, specifically Pahang. In the industry, the result of this study is beneficial for supply chain managers and policymakers to ease the ISO implementation and reduce supply chain risks.

    pdf4p longtimenosee10 26-04-2024 6 1   Download

  • This paper is objective to examine the barrier of ISO28000 implementation. As more and more supply chain process faced disruption and delay due to accident, importance of supply chain security management attract the concern from top management of organization. ISO 28000 is a standard that released in 2007 which specify requirement for security management system for the supply chain. However, there are still many organization didn’t apply for this standard.

    pdf8p longtimenosee10 26-04-2024 8 1   Download

  • The paper describes specific aspects of land use planning and forecasting for effective supply chain management. Close attention is paid to the territorial planning projects having been implemented in the United States, England, Germany, the former Soviet Union and Russia. Land is characterized as an object for planning and forecasting as well as the basis for food security. There is a real need for area development planning and forecasting to provide management of agri-food supply chains.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • Ebook "Food security governance in the arctic-barents region" provides a multidisciplinary perspective on the major food security and safety challenges faced in the Arctic region. The authors address existing gaps in current knowledge of the coordination and implementation of legal framework and policy that affects the Arctic. The volume is unique in its focus on the Barents region, an area of northern Europe containing Norway, Sweden, Finland and Russia. The region has a population of approximately 5.2 million, including indigenous and non-indigenous peoples.

    pdf155p tracanhphuonghoa1007 22-04-2024 3 2   Download

  • This paper reviews the challenges in implementing Industry 4.0. The literatures found in this paper mainly from Google Scholar, Science Direct and Emerald. In short, the challenges can be imparted into seven major categories. There are data management and Integration, knowledgedriven, process, security, capital, workforce, and education.

    pdf8p longtimenosee09 08-04-2024 6 0   Download

  • The study was carried out on the basis of work with grant of the RFBR No. 19-010-00040 “Interaction between the real and virtual sectors of the economy in order to increase their efficiency and ensure a balance of interests between business, society and the state”. This paper proposed to introduce integrated indicators of the effect of digitalization.

    pdf9p longtimenosee09 08-04-2024 6 2   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • Ebook "CCNA Security - Official Certification Guide" presents the following content: Part I: Network security concepts, Part II: Constructing a secure infrastructure, Part III: Extending security and availability with cryptography and VPNs, Part IV: Final preparation, Part V: Appendixes.

    pdf672p longtimenosee08 31-03-2024 3 1   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p longtimenosee08 31-03-2024 2 1   Download

  • In ebook Operating systems: A concept-based approach - Part 2, the following content will be discussed: Chapter 11: memory management, chapter 12: virtual memory, chapter 13: file systems, chapter 14: implementation of file operations, chapter 15: security and protection, chapter 16: distributed operating systems, chapter 17: theoretical issues in distributed systems, chapter 18: distributed control algorithms, chapter 19: recovery and fault tolerance, chapter 20: distributed file systems, chapter 21: distributed system security.

    pdf469p longtimenosee05 31-03-2024 3 0   Download

  • Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 1: about PCI and this book; chapter 2: introduction to fraud, ID theft, and regulatory mandates; chapter 3: why PCI is important; chapter 4: building & maintaining a secure network; chapter 5: protect cardholder data; chapter 6: logging access & events chapter; chapter 7: strong access control.

    pdf188p longtimenosee05 31-03-2024 4 0   Download

  • Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 8: vulnerability management; chapter 9: monitoring and testing; chapter 10: how to plan a project to meet compliance; chapter 11: responsibilities; chapter 12: planning to fail your first audit; chapter 13: you’re compliant, now what.

    pdf166p longtimenosee05 31-03-2024 9 0   Download

  • The study explores the various facets of different wave retail banking models, including their merits, demerits are security issues, to share the wave retail wave banking implementation in Bangladesh. Apart from that, this research evaluates the current status and preparedness of banks to facilitate wave retail banking in Bangladesh. To developed smooth operation and application of wave retail banking in Bangladesh. This research focuses only on renown Banks in Bangladesh.

    pdf7p longtimenosee04 06-03-2024 8 1   Download

  • The article found that enhancing cyber security is a pressing need to improve the future implementation of e-arbitration in Malaysia successfully. Therefore, the article recommended several legal and technical measures to enhance cyber-security in e-arbitration in Malaysia.

    pdf5p longtimenosee04 06-03-2024 7 2   Download

  • Ebook A technical guide to IPSec virtual private networks: Part 1 includes content: Chapter 1: getting started, chapter 2: technical primer, chapter 3: IP security primer, chapter 4: cryptography, chapter 5: implementation theory, chapter 6: authentication, chapter 7: IPSec architecture, chapter 8: security protocols.

    pdf185p longtimenosee03 22-02-2024 4 2   Download

  • Ebook A technical guide to IPSec virtual private networks: Part 2 includes content: Chapter 9: key management, chapter 10: IKE in action, chapter 11: areas of interest within IKE, chapter 12: security policies and the security of VPNs, chapter 13: implementation considerations, chapter 14: product evaluation, chapter 15: report on IPSec.

    pdf193p longtimenosee03 22-02-2024 4 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
4=>1