Listing 1 - 10 of 4105 | << page >> |
Sort by
|
Choose an application
Choose an application
Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
Choose an application
Each year, the workshop brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Over time, EuroSec has established itself as a forum for presenting and discussing novel ideas with the community, before they are further developed into full papers.
Choose an application
Choose an application
Choose an application
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce’s writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic , the Wall Street Journal , CNN, the New York Times , the Washington Post, Wired , and many others. And now you can enjoy his essays in one place—at your own speed and convenience. • Timely security and privacy topics • The impact of security and privacy on our world • Perfect for fans of Bruce’s blog and newsletter • Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.
Choose an application
Choose an application
The analytical report was prepared by the results of the research work "Donbass in the information security system of the state: regional distinctions, external challenges, tools of struggle against anti-Ukrainian propaganda", which was performed at the I.F. Kuras Institute of Political and Ethnic Studies of the National Academy of Sciences of Ukraine in 2015. As a result of a project completion, the regional distinctions of Donbass, external challenges, tools of struggle against anti-Ukrainian propaganda in the information security system of the state were examined.
Listing 1 - 10 of 4105 | << page >> |
Sort by
|