MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK
نویسندگان
چکیده
منابع مشابه
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملMathematical and Computer Modelling in Information System Security
Introduction With the development of network technology and information technology, it becomes available to share information at anywhere on anytime. For example, with the convergence between digital TV and mobile network, one can watch TV program on the TV set at home, and continue to watch it over his mobile terminal when he goes out of home. In a word, various information systems are appeari...
متن کامل" Computer Network Security "
The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...
متن کاملComprehensive Evaluation Model for Computer Network Security with Linguistic Information
In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for for evaluating the computer network security with linguistic information. We utilize the pure linguistic weighted arithmetic averaging (PLWAA) operator to aggregate the linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the alternatives a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information systems and technologies security
سال: 2019
ISSN: 2707-1758
DOI: 10.17721/ists.2019.1.36-41