Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

32 33 34 35 36
hits: 351
331.
Full text
332.
Full text

PDF
333.
  • THE RISE AND FALL OF WEBTRUST
    Cho, Charles H; Boulianne, Emilio 2009
    Paper

    Despite the growth in electronic commerce (hereafter, “e-commerce”) usage, consumers are still reluctant to purchase online due to security and privacy concerns. To alleviate this issue, e-commerce ...
Check availability
334.
Full text

PDF
335.
  • Studies on Employees’ Information Security Awareness
    Häußinger, Felix
    Web Resource

    Provider: - Institution: - Data provided by Europeana Collections- Göttingen, Georg-August Universität, Diss., 2015- All metadata published by Europeana are available free of restriction under the ...
Full text
336.
Full text

PDF
337.
  • Security Audit Center--a su... Security Audit Center--a suggested model for effective audit strategies in health care informatics
    Hayam, A International journal of bio-medical computing 35 Suppl
    Journal Article
    Peer reviewed

    As dependence upon interorganizational and international health care informatics becomes absolute, and with increased vulnerability of information networks and applications and the cunning ...
Full text
Available for: IJS, IMTLJ, KILJ, KISLJ, NUK, SBCE, SBJE, UL, UM, UPCLJ, UPUK
338.
  • Implementing Context and Te... Implementing Context and Team Based Access Control in Healthcare Intranets
    Georgiadis, Christos K.; Mavridis, Ioannis K.; Nikolakopoulou, Georgia ... Medical informatics and the internet in medicine, 09/2002, Volume: 27, Issue: 3
    Journal Article

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and ...
Full text
Available for: DOBA, IJS, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
339.
  • Enforceable security policies Enforceable security policies
    Schneider, F.B. Foundations of Intrusion Tolerant Systems, 2003 Organically Assured and Survivable Information Systems, 2003
    Conference Proceeding
    Open access
Full text
Available for: IJS, NUK, UL, UM

PDF
340.
  • 101 zabezpieczeń przed atakami w sieci komputerowej
    Szmit, Maciej; Gusta, Marek; Tomaszewski, Mariusz 2005
    Web Resource

    Provider: - Institution: - Data provided by Europeana Collections- Zemanek, Krzysztof red.- Lodz University of Technology Library. Digital Content Creation and Access Management Department.- ...
Full text
32 33 34 35 36
hits: 351

Load filters