Search

Your search keyword '"enterprise security"' showing total 67 results

Search Constraints

Start Over You searched for: Descriptor "enterprise security" Remove constraint Descriptor: "enterprise security" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
67 results on '"enterprise security"'

Search Results

1. ENSURING THE ECONOMIC SECURITY OF THE ENTERPRISE IN A MARKET ECONOMY.

2. Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work.

3. Use of special technical means (polygraph) on personnel recruitment in corporate structures

4. METHODOLOGICAL APPROACHES TO ENTERPRISE SECURITY MANAGEMENT: TRADITIONAL AND TRANSFORMED TO THE CONDITIONS OF FUNCTIONING.

5. Using a Digital Transformation to Improve Enterprise Security—A Case Study

7. Formation of the Security Plane of Enterprise under the Influence of Risks and Threats

8. Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work

9. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

10. Enterprise Data Security in the Cloud Environment: Threat Analysis

11. Enterprise Data Security in the Cloud Environment: Threat Analysis.

12. Theoretical-definitive exposition of the categorical apparatus for investigating the management of environmental safety in an enterprise

13. ANALYSIS OF DIGITALIZATION CHANGES AND THEIR IMPACT ON ENTERPRISE SECURITY MANAGEMENT UNDER UNCERTAINTY.

14. A Model for Implementing Digital Personnel Management in Security and Safety for Engineering Enterprises.

16. Analysis of the Problems of Industrial Enterprises Information Security Audit

17. Smart Assistants in IT Security – An Approach to Addressing the Challenge by Leveraging Assistants’ Specific Features

18. 제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구.

19. Theoretical and Methodological Basis of Management of Enterprise Development Security

20. The Level of Security of the Enterprise’s Development as a Balance of Statics and Dynamics: Parameterization of the Main Indicators of Activity

21. Cyber-Warranties as a Quality Signal for Information Security Products

22. Enterprise network security from cloud computing perspective.

23. The System Analysis of Ensuring the Stability of Innovative and Digital Economy on the Basis of Intellectual Comprehensive Security System

24. Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models

25. Obfuscation and Diversification for Securing Cloud Computing

26. Mobile fog based secure cloud-IoT framework for enterprise multimedia security.

27. Security Qualitative Metrics for Open Web Application Security Project Compliance.

28. Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights

30. Bibliography

31. Теоретико-методичний базис управління безпекою розвитку підприємства

32. Security Qualitative Metrics for Open Web Application Security Project Compliance.

33. МЕТОДИЧНІ АСПЕКТИ ОЦІНЮВАННЯ РІВНЯ ФІНАНСОВОЇ БЕЗПЕКИ МАЛИХ ПІДПРИЄМСТВ

34. ОЦІНКА ЕКОНОМІЧНОЇ БЕЗПЕКИ ПІДПРИЄМСТВА НА БАЗІ КОНЦЕПЦІЇ VBM

35. Изменение политики кадровой безопасности на предприятии в условиях пандемии COVID-19

36. Arquitecturas de seguridad OT y protección mediante Deception

37. Levers of enterprise security control: a study on the use, measurement and value contribution.

38. Técnicas y herramientas para el análisis de debilidades en volcados de memoria RAM de sistemas basados en Linux

39. Seguridad en redes empresariales: Protegiendo el acceso privilegiado

40. ВЛИЯНИЕ САНКЦИЙ НА ЭКОНОМИЧЕСКУЮ БЕЗОПАСНОСТЬ ПРЕДПРИЯТИЙ НЕФТЕГАЗОВОЙ ОТРАСЛИ

41. LOCKS

42. Системный анализ обеспечения стабильности эффективного функционирования инновационной и цифровой экономики на основе интеллектуализации системы комплексной безопасности

44. Методичні аспекти оцінювання рівня фінансової безпеки малих підприємств

45. The essence of the strategy and its significance for the enterprise security

46. The system analysis of ensuring the stability of innovative and digital economy on the basis of intellectual comprehensive security system

47. Overall process model - Integrated security model

48. The Implementation of Personnel and Social Programs of the Enterprise in the Aspect of Work with Young Specialists

49. The BASC Standard and enterprise security for safe trade in supermarkets in Bogota

50. Best Practices for Enterprises to Prevent Social Engineering Attacks.

Catalog

Books, media, physical & digital resources