Buscar
Mostrando ítems 1-10 de 4765
Comparing topics in CS syllabus with topics in CS research
(Association for Computing Machinery, 2016)
This study quantifies and compares the computer security themes found in the ACM Computer Science curricula with the themes addressed in top-ranked computer security re- search conferences over the past six years. On the ...
Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)
(2012-06-01)
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats ...
Segurança em pequenas empresas
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Eletrônica, 2012-06-06)
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ...
Utilização de firewall em aplicação de segurança e ferramentas gerenciais
(Universidade Tecnológica Federal do ParanáCuritibaBrasilTecnologia em Sistemas de TelecomunicaçõesUTFPR, 2017-06-08)
Information security is related to the protection of valuable data of an individual or a particular company, with the high demand in the search for information integrity and the confidentiality of systems, such as: banking ...
Green Cloud Computing Ideas with Security Threats and Solutions
(Universidad del Zulia, 2019)
A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers
Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud ...
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...