中图分类
执行
    中文(共0篇) 外文(共5630篇)
    排序:
    导出 保存至文件
    [科技报告]   J. D. Fluckiger        共9页
    摘要 : The first steps toward professional recognition include a certification program that the International Information Systems Security Certification Consortium is prepared to develop and oversee. Our profession has evolved in the las... 展开

    [科技报告]   Koon, D M   Zowin, JA        共15页
    摘要 : Commonly, a system creator will seek to limit access to various parts of an information system based on the user is and what authorities should be granted that person. With a payroll system, it would be expected that only a limite... 展开

    [科技报告]   carlstedt,jim        共33页
    摘要 : This report describes a class of operating system protection errors known as 'insufficient validation of critical conditions,' or simply 'validation errors,' and outlines a scheme for finding them. This class of errors is recogniz... 展开

    [科技报告]   Hamlen, K.   Kantarcioglu, M.   Khan, L.   Thuraisingham, B.        共15页
    摘要 : In this paper we discuss security issues for cloud computing including storage security, data security, and network security and secure virtualization. Then we select some topics and describe them in more detail. In particular, we... 展开

    [科技报告]      共18页
    摘要 : During the President's National Security Telecommunications Advisory Committee (NSTAC) XXV Principals' Meeting of March 12-13, 2002, concern was expressed over the ability to protect the 'edges' of the Internet against attack or e... 展开

    [科技报告]      共28页
    摘要 : This manual is a guide to use of the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. KSV VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding U... 展开

    [科技报告]   Orvis, W. J.   Krystosek, P.   Smith, J.        共94页
    摘要 : With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages... 展开

    [科技报告]   Harper, S. R.        共228页
    摘要 : This volume is Section 10, Program Listing, of the basic document. It contains a complete listing of all computer program components (CPC's) that comprise the Security Kernel for the PDP-11/45. (Author)

    [科技报告]   Campbell, P. L.        共40页
    摘要 : COBIT is a set of documents that provides guidance for computer security. This report introduces COBIT by answering the following questions, after first defining acronyms and presenting definitions: 1. Why is COBIT valuable. 2. Wh... 展开

    [科技报告]   E. E. Schultz        共13页
    摘要 : The purpose of this paper is to evaluate two Federal statutes, the Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987, from the perspective of computer security incident response efforts. First, the major r... 展开

    研究趋势
    相关热图
    学科分类