![](images/graphics/blank.gif)
The confidentiality of the information
-
The information age has seen the development of electronic pathways that carry vast amounts of valuable commercial, scientific, and educational information between financial institutions, companies, individuals, and government organisations. Unfortunately the unprecedented levels of access provided by systems like the Internet also expose this data to breaches of confidentiality, disruption of service, and outright theft. The cryptlib security toolkit provides the answer to this problem. A complete description of the capabilities provided by cryptlib is given below.
342p
zizaybay1103
29-05-2024
3
2
Download
-
The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.
372p
zizaybay1103
29-05-2024
5
2
Download
-
The study has used qualitative exploratory case study through semi-structured interviews. The interviews were conducted by the project manager, coordination officer, and supply manager from humanitarian NGOs providing educational services for Syrian refugees in their offices in Amman. The results were analysed based on the interviews, conducted among employees.
9p
longtimenosee10
26-04-2024
2
1
Download
-
The aim of this research is to gather information on the extent of e-wallet fraud and whether respondents have heard of bank staff being involved in fraud with objective of creating awareness on how the public can be more aware of the pitfalls of using e-wallet and banking online applications for day-to-day transactions, particularly through the use of the mobile phone to make a transaction.
5p
longtimenosee06
27-03-2024
8
2
Download
-
Part 2 book "The IACUC administrator’s guide to animal program management" includes content: Field studies; personnel qualifications and training programs; tracking animal use on protocols; veterinary care programs; whistle blower policy; occupational health and safety program; emergency disaster plans; the role of a primary grantee; foia, sunshine laws, and confidential information; dod and va regulations - know the differences; data management and electronic systems; policies, guidelines, and standard operating procedures.
142p
oursky09
08-11-2023
6
3
Download
-
Doing the actual math behind modern encryption is admittedly quite difficult, but using the tools that do the work for you isn’t difficult at all once you have a rudimentary understanding of when to use which sort of encryption. PGP & GPG: Email for the Practical Paranoid will take you step by step through the world of encryption and digital signatures and teach you how to use the tools that will allow you to protect your confidential information while sharing it as you desire.
216p
haojiubujain06
23-10-2023
4
3
Download
-
Part 1 of ebook "A graduate course in applied cryptography" develops symmetric encryption which explains how two parties, Alice and Bob, can securely exchange information when they have a shared key unknown to the attacker. We discuss data confidentiality, data integrity, and the important concept of authenticated encryption.
411p
tieulangtran
28-09-2023
14
3
Download
-
Research on the implementation of health information exchange (HIE) organizations has identified both positive and negative effects of laws relating to governance, incentives, mandates, sustainability, stakeholder participation, patient engagement, privacy, confidentiality, and security.
10p
visteverogers
24-06-2023
4
2
Download
-
In this article, the author presents existing problems in information security and confidentiality at Vietnamese universities and propose measures for cybersecurity and information in the current Digital age.
6p
viindranooyi
07-05-2022
34
10
Download
-
This paper suggests a new solution to conceal text messages in media by hybridizing a meta-heuristic algorithm of the Gravity search algorithm (GSA) and transposition method. Several stages are implemented, namely the concealment stage, extract stage, and evaluation metrics, whereas cover text and message text are split into blocks, and each block contains one letter, relying on the fitness value of related notes both of secret information and cover message.
9p
linyanjun_2408
21-04-2022
15
3
Download
-
The study investigated a number of benefits, such as reducing processing time, decreasing operation cost, improving efficiency of human resource, high confidential and accurate information, optimizing the utility of other IT application. However, there are also internal and external factors that have hindered the implementation of e-invoice. Some suggestions to overcome these obstacles were presented in this paper.
6p
huyetthienthan
23-11-2021
12
1
Download
-
The experience of many countries shows that developing a credit rating industry is an effective means of improving and facilitating information transparency and capital market development. This paper argues that credit rating activities should be promoted in Vietnam. It opens with a description of the need for credit rating in Vietnam: to enhance information transparency, help attract international capital, and promote integration of its capital market into the regional capital market. Arguments are then put forward as to why Vietnam should develop domestic credit rating agencies (CRAs).
11p
nguathienthan6
02-07-2020
22
0
Download
-
Although ready to let their children use the apps, a number of parents are concerned about the confidentiality of the information, the legality and effectiveness of the apps.
12p
capheny
29-02-2020
8
0
Download
-
Although ready to let their children use the apps, a number of parents are concerned about the confidentiality of the information, the legality and effectiveness of the apps. Some technologically incapable parents are reluctant to use the apps, worried about online payment risk which may not be covered by the insurance. Some recommendations and limitations of the study are also given.
12p
capheny
28-02-2020
8
1
Download
-
Work For Hire and Proprietary Agreement. Whereas, Contractor has been or will be engaged in the performance of work in the area of. Company and Contractor wish to evidence by this agreement the manner in which said confidential and proprietary information will be treated. In addition, you can refer to Bộ Tài Liệu Quy Trình Tuyển Dụng Và Training Nhân Viên Từ A-Z on TaiLieu.VN to learn more about the processes, recruitment forms and staff training in the enterprise.
3p
vrohtovitamin
13-06-2019
29
2
Download
-
Though there is no technical definition by any statutory body for Cybercrime, it is broadly defined by the Computer Crime Research Centre as - “Crimes committed on the internet using the computer either as a tool or a targeted victim. Cybercrime could also include non-monetary offenses, such as creating and distributing small or large programs written by programmers called viruses on other computers or posting confidential business information on the Internet.
5p
hongnhan878
12-04-2019
36
2
Download
-
The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality.
7p
blossom162
31-03-2019
45
2
Download
-
In this research, Flipora plug-in was installed on different browsers. Security evaluation and analysis were performed on the function performance of this plug-in in upon. User traffics that were sent from the browser when during visiting and opening various web pages were evaluated and analyzed. In our simulation, we show that what confidential information will be sent to the intended destination by Flipora plug-in that which was installed on Firefox browser.
5p
byphasse043256
23-03-2019
22
1
Download
-
One of the main reasons is that when we share the information (in the form of images or documents) with our known contacts then actually we are also sharing the information with the telecommunication companies and the company that provide the software. In this paper we present a symmetric key encryption based solution for information privacy and security. Our approach is based on Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) to ensure confidentiality and integrity of the encrypted information.
7p
byphasse043256
23-03-2019
22
0
Download
-
part 1 book “good medical practice - professionalism, ethics and law” has contents: ethical principles for the medical profession, ethical and legal responsibilities of medical students, communication skills, consent and informed decision making, confidentiality, privacy and disclosure, medical records, reports and certificates,… and other contents.
223p
tieu_vu13
06-08-2018
29
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)