intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security trust

Xem 1-20 trên 124 kết quả Security trust
  • Part 2 of ebook "Strategies in E-business: Positioning and social networking in online markets" provides readers with contents including: search engine optimization and ethical leadership strategies; search engine ranking a SEO strategy; the integration of social networks in the competitiveness of cooperation networks; how are new media changing the working environment; the importance of trust in information security in interconnected organisations;...

    pdf83p giangmacvien 22-06-2024 2 1   Download

  • Ebook Personal finance for seniors for Dummies empowers you to chart your financial course for the decades to come, guiding you through the basics of creating a budget for retirement, investing accrued assets, taking advantage of governmental and nongovernmental benefits and planning for your family's future. You'll get trusted, practical information on reexamining investment strategies and rebalancing a portfolio, long-term care options, pension plans and social security, health care, Medicare, and prescription drug costs, and so much more.

    pdf459p zizaybay1104 29-05-2024 284 2   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

    pdf205p longtimenosee08 31-03-2024 5 1   Download

  • Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.

    pdf129p longtimenosee05 31-03-2024 2 0   Download

  • The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will find its proceedings useful and valuable to read.

    pdf182p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 8 0   Download

  • The significant objective of this study therefore centres on how to improve trust using extended technology acceptance model (e-TAM) by incorporating perceived security and e-trust with perceived usefulness and perceived ease of use to predict adoption of e-banking.

    pdf11p longtimenosee07 29-03-2024 3 2   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf482p longtimenosee03 22-02-2024 2 2   Download

  • This article aims to identify the factors that affect ASEAN-China relations in the political, diplomatic, security, defense, and economic dimensions. The challenge to the development of political and diplomatic relations between ASEAN and China is the imbalance and lack of trust in their relationship.

    pdf16p vibego 02-02-2024 3 2   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 7 2   Download

  • Ebook "Mobile cloud computing" includes content: Mobile computing, cloud computing, mobile cloud computing, offloading in mobile cloud computing, green mobile cloud computing, resource allocation in mobile cloud computing, sensor mobile cloud computing, mobile social cloud computing, privacy and security in mobile cloud computing, trust in mobile cloud computing, vehicular mobile cloud computing, business aspects of mobile cloud computing,... and other contents.

    pdf368p haojiubujain07 20-09-2023 5 4   Download

  • Continued part 1, part 2 of ebook "A practical guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security" provides readers with contents including: authorizations and sessions; extended authorization (EA) policies; key management; auditing TPM commands; decrypt/encrypt sessions; context management; startup, shutdown, and provisioning; debugging; dolving bigger problems with the TPM 2.0;...

    pdf209p tieulangtran 28-09-2023 5 3   Download

  • Part 1 of ebook "A practical guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security" provides readers with contents including: history of the TPM; basic security concepts; quick tutorial on TPM 2.0; existing applications that use TPMs; navigating the specification; execution environment; TPM software stack; TPM entities; hierarchies;...

    pdf166p tieulangtran 28-09-2023 6 2   Download

  • Continued part 1, part 2 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: network security in the cloud; identity management and control for clouds; trusted virtual machines - ensuring the integrity of virtual machines in the cloud; a reference design for secure cloud bursting;...

    pdf112p tieulangtran 28-09-2023 3 3   Download

  • Part 1 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: cloud computing basics; the trusted cloud - addressing security and compliance; platform boot integrity - foundation for trusted compute pools; attestation - proving trustability; boundary control in the cloud - geo-tagging and asset tagging;...

    pdf128p tieulangtran 28-09-2023 5 2   Download

  • Continued part 1, part 2 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 4 - IoT software security building blocks; chapter 5 - connectivity technologies for IoT; chapter 6 - IoT vertical applications and associated security requirements;...

    pdf275p tieulangtran 28-09-2023 5 3   Download

  • Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with hardware-based content protection technology; breaking the boundaries with dynamically loaded applications;...

    pdf143p tieulangtran 28-09-2023 5 3   Download

  • Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.

    pdf196p haojiubujain06 05-09-2023 10 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2