Showing 31 - 40 of 38,314
Purpose This paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason for the incomplete training techniques in IT security is the interdisciplinary of the field. Social engineering is...
Persistent link: https://www.econbiz.de/10014754713
Active Directory is an implementation of the director services LDAP(Lightweight Directory Access Protocol), used by Microsoft within the operating systems Windows. Thus, Active Directorymakes available for the administratorilor a flexible environment with a global effect in order to: assign...
Persistent link: https://www.econbiz.de/10008479449
The recent North Korean crisis is the latest phase in a lengthy U.S.-North Korean deterrence relationship. That relationship, particularly its problems and limitations, is reviewed and the effectiveness of each side's contemporary deterrence posture is assessed. It is noted that deterrence and...
Persistent link: https://www.econbiz.de/10010770286
Through this article we aim to present the role of information and the manner in which information superiority affects decision-making development, planning and operational management of actions taken within each organization. Increasing the role of information structures in XXI century...
Persistent link: https://www.econbiz.de/10011066085
Purpose The purpose of this paper is to identify customers’ needs and expectations regarding servicescape surveillance management (SSM) in order to suggest to service managers how they can carefully design a service environment to ensure a high level of security while concurrently enhancing...
Persistent link: https://www.econbiz.de/10015032360
Persistent link: https://www.econbiz.de/10015072696
Persistent link: https://www.econbiz.de/10011609769
Persistent link: https://www.econbiz.de/10011745450
Persistent link: https://www.econbiz.de/10009507664
Persistent link: https://www.econbiz.de/10011391736