نتایج جستجو برای: us national security strategy
تعداد نتایج: 1180661 فیلتر نتایج به سال:
example, should they first address a vulnerability with a severity of “5” or one with a severity of “high”? The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Stand...
Computer T he rash of viruses, intrusions, and other attacks on computer systems during the past two years has focused considerable attention on network security in the US. At the same time, experts say the US is not spending enough on networksecurity research and universities are not producing enough graduates with advanced degrees in the field to conduct the necessary future research. This si...
Since their introduction in the 1940s, peaceful use of stable isotopes and radioisotopes in the United States has expanded continuously. Today, new isotopes for diagnostic and therapeutic uses are not being developed, critical isotopes for national security are in short supply, and demand for isotopes critical to homeland security exceeds supply. While commercial suppliers, both domestic and fo...
One would think that the enactment of the HIPAA, with its mandates on data security and privacy, would have brought a major shift in the security management practices within the US healthcare. Unfortunately, recent industry reports indicate low levels of regulatory compliance, thus raising security concerns for the US health IT infrastructure. This research develops a regulatory compliance mode...
One would think that the enactment of the HIPAA, with its mandates on data security and privacy, would have brought a major shift in the security management practices within the US healthcare. Unfortunately, recent industry reports indicate low levels of regulatory compliance, thus raising security concerns for the US health IT infrastructure. This research develops a regulatory compliance mode...
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید