نتایج جستجو برای: computer security

تعداد نتایج: 723551  

2008
JORGE A. RUIZ-VANOYE OCOTLAN DÍAZ-PARRA ISMAEL RAFAEL PONCE-MEDELLÍN JUAN CARLOS OLIVARES-ROJAS Jorge A. Ruiz-Vanoye

The necessity of the companies and organizations to adapt the technological changes of the computer science takes to formulated key questions: How to measure the security of my organization?, What type of Computer Science Security needs my company, financial organization, or government? Did my financial organization counts with aspects of computer science security in the correct areas? What new...

2011
Narayan Murthy

To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses at both the undergraduate and the graduate level. This paper describes our approach, our experiences, and lessons learned in teaching a Computer Security Overview cour...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده مهندسی برق و کامپیوتر 1388

چکیده ندارد.

Journal: :international journal of information science and management 0
h. jahankhani university of east london school of computing and technology

the growth and the expansion of the internet and the world wide web continue to impact society in new and amazing ways. the role of economic commerce has not been as dynamic as some predicted, but has still demonstrated remarkable success and tremendous potential. any failure to meet some of the expectations may be explained in large part by questions and concerns surrounding existing methods o...

Journal: :Internet Research 1995
Gregory R. Doddrell

Users who downloaded this article also downloaded: Lam#for Kwok, Dennis Longley, (1999),"Information security management and modelling", Information Management & Computer Security, Vol. 7 Iss 1 pp. 30-40 Kevin J. Fitzgerald, (1995),"Information security baselines", Information Management & Computer Security, Vol. 3 Iss 2 pp. 8-12 Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),...

Journal: :Inf. Manag. Comput. Security 1994
William J. Caelli

Users who downloaded this article also downloaded: Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),"Formalizing information security requirements", Information Management & Computer Security, Vol. 9 Iss 1 pp. 32-37 Dieter Fink, (1994),"A Security Framework for Information Systems Outsourcing", Information Management & Computer Security, Vol. 2 Iss 4 pp. 3-8 Kevin J. Fitzgerald,...

2010
Matt Bishop

Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of our lives, and the interconnections with more traditional academic disciplines such as analysis of algorithms, operating systems, and network protocols have convinc...

Journal: :International Journal of Computer Mathematics 2013

Journal: :International Journal of Computer and Communication Technology 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید