UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

48 49 50
zadetkov: 1.085.879
491.
  • Human and International Sec... Human and International Security in India
    Crispin Bates, Akio Tanabe, Minoru Mio / Crispin Bates, Akio Tanabe, Minoru Mio 2016, 20150907, 2015, 2015-09-07
    eBook
    Odprti dostop

    With its common colonial experience, an overarching cultural unity despite apparent diversities, and issues of nation-building cutting across national frontiers, South Asia offers a critical site on ...
Celotno besedilo
492.
  • Hacking For Dummies Hacking For Dummies
    Beaver, Kevin 2013, 2015, 2013-02-06, 2015-12-16
    eBook

    Updated for Windows 8 and the latest version of LinuxThe best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking ...
Celotno besedilo
493.
  • Security of Block Ciphers Security of Block Ciphers
    Sakiyama, Kazuo; Sasaki, Yu; Li, Yang 2015, 2016, 2015-09-04, 2015-07-16
    eBook

    A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysisWritten by authors known within the academic cryptography community, ...
Celotno besedilo
494.
  • Novel efficient techniques ... Novel efficient techniques for real-time cloud security assessment
    Modic, Jolanda; Trapero, Ruben; Taha, Ahmed ... Computers & security, September 2016, 2016-09-00, 20160901, Letnik: 62
    Journal Article
    Recenzirano

    Cloud computing offers multiple benefits to users by offloading them of the tasks of setting up complex infrastructure and costly services. However, these benefits come with a price, namely that the ...
Celotno besedilo
495.
  • The rise of ransomware and ... The rise of ransomware and emerging security challenges in the Internet of Things
    Yaqoob, Ibrar; Ahmed, Ejaz; Rehman, Muhammad Habib ur ... Computer networks (Amsterdam, Netherlands : 1999), 12/2017, Letnik: 129
    Journal Article
    Recenzirano

    With the increasing miniaturization of smartphones, computers, and sensors in the Internet of Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have become key ...
Celotno besedilo
496.
  • The national security field... The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
    Pavlenko, Tetіana; Korabel, Mariia Journal of geography, politics and society, 09/2022, Letnik: 12, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    This article touches upon the problem of organizing security space under the conditions of armed aggression of the Russian Federation against Ukraine in 2022. According to the understanding of the ...
Celotno besedilo
497.
  • European Homeland Security European Homeland Security
    Kaunert, Christian; Léonard, Sarah; Pawlak, Patryk 2012, 20120504, 2012-05-04, 20120101
    eBook, Book

    This book examines the processes and factors shaping the development of homeland security policies in the European Union (EU), within the wider context of European integration. The EU functions in a ...
Celotno besedilo
498.
  • Understanding key skills fo... Understanding key skills for information security managers
    Haqaf, Husam; Koyuncu, Murat International journal of information management, December 2018, 2018-12-00, 20181201, Letnik: 43
    Journal Article
    Recenzirano

    •Sixteen skills are shortlisted as the key skills for ISMs, using the Delphi method.•The top two key skills are from the project and risk management categories.•The core information security skills ...
Celotno besedilo
499.
  • A broker-based framework fo... A broker-based framework for standardization and management of Cloud Security-SLAs
    Halabi, Talal; Bellaiche, Martine Computers & security, 06/2018, Letnik: 75
    Journal Article
    Recenzirano

    Security is still one of the main barriers discouraging companies and businesses which deal with sensitive information and confidential data from migrating toward the Cloud. Recent efforts have tried ...
Celotno besedilo
500.
Celotno besedilo

PDF

Dosegli ste najvišje možno število prikazanih rezultatov iskanja.

  • Zaradi večje učinkovitosti iskanje ponudi največ 1.000 rezultatov na poizvedbo (oz. 50 strani, če je izbrana možnost 10/stran).
  • Za nadaljnje pregledovanje rezultatov razmislite o uporabi filtrov rezultatov ali spremembi razvrstitve rezultatov.
48 49 50
zadetkov: 1.085.879

Nalaganje filtrov