Showing 1 - 10 of 29
is shown as well the design of the cadastral software application. The online solution for the security management in the … vulnerability for the future processes, which gather all the functionality of the security system. It will be determined all the … functions and new functionalities of the security management solution for the cadastral system. The future system will assure …
Persistent link: https://www.econbiz.de/10009416285
and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at …
Persistent link: https://www.econbiz.de/10009416286
The paper presents the main aspects regarding the development of the information security and assurance of their … security. The information systems, standards and audit processes definitions are offered. There are presented the most … important security standards used in information system security assessment …
Persistent link: https://www.econbiz.de/10009416378
The informatics security concept is defined. For informatics applications which have a classical structure, the …-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when …
Persistent link: https://www.econbiz.de/10009416380
The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A...
Persistent link: https://www.econbiz.de/10009416400
information system. The paper highlights the security vulnerabilities in web applications and the processes of their detection … international standards developed for information system security assurance. …
Persistent link: https://www.econbiz.de/10009416429
Nowadays the business medium requires anytime and anywhere connectivity. In an increasingly competitive business environment, more and more organizations need fast responses and instant results. Therefore, mobility changes the way companies do business; instant messaging, voice services,...
Persistent link: https://www.econbiz.de/10009416435
. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions … are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security …
Persistent link: https://www.econbiz.de/10009416442
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones. The present research is aimed at helping...
Persistent link: https://www.econbiz.de/10009416447
related to security. First section addresses the optimization process and how it is approached when dealing with security. The … identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its …
Persistent link: https://www.econbiz.de/10009416490