Showing 1 - 10 of 30
Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct...
Persistent link: https://www.econbiz.de/10009416581
accordance with: the following information criteria: efficiency, effectiveness, availability, integrity, confidentiality, accord …
Persistent link: https://www.econbiz.de/10011145580
is shown as well the design of the cadastral software application. The online solution for the security management in the … vulnerability for the future processes, which gather all the functionality of the security system. It will be determined all the … functions and new functionalities of the security management solution for the cadastral system. The future system will assure …
Persistent link: https://www.econbiz.de/10009416285
and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at …
Persistent link: https://www.econbiz.de/10009416286
The paper presents the main aspects regarding the development of the information security and assurance of their … security. The information systems, standards and audit processes definitions are offered. There are presented the most … important security standards used in information system security assessment …
Persistent link: https://www.econbiz.de/10009416378
The informatics security concept is defined. For informatics applications which have a classical structure, the …-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when …
Persistent link: https://www.econbiz.de/10009416380
The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A...
Persistent link: https://www.econbiz.de/10009416400
information system. The paper highlights the security vulnerabilities in web applications and the processes of their detection … international standards developed for information system security assurance. …
Persistent link: https://www.econbiz.de/10009416429
Nowadays the business medium requires anytime and anywhere connectivity. In an increasingly competitive business environment, more and more organizations need fast responses and instant results. Therefore, mobility changes the way companies do business; instant messaging, voice services,...
Persistent link: https://www.econbiz.de/10009416435
. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions … are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security …
Persistent link: https://www.econbiz.de/10009416442