Search

Your search keyword '"enterprise security"' showing total 93 results

Search Constraints

Start Over You searched for: Descriptor "enterprise security" Remove constraint Descriptor: "enterprise security"
93 results on '"enterprise security"'

Search Results

1. Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work.

2. Using a Digital Transformation to Improve Enterprise Security—A Case Study

4. Use of special technical means (polygraph) on personnel recruitment in corporate structures

5. METHODOLOGICAL APPROACHES TO ENTERPRISE SECURITY MANAGEMENT: TRADITIONAL AND TRANSFORMED TO THE CONDITIONS OF FUNCTIONING.

6. Formation of the Security Plane of Enterprise under the Influence of Risks and Threats

7. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

8. Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work

9. Enterprise Data Security in the Cloud Environment: Threat Analysis

10. Enterprise Data Security in the Cloud Environment: Threat Analysis.

11. ANALYSIS OF DIGITALIZATION CHANGES AND THEIR IMPACT ON ENTERPRISE SECURITY MANAGEMENT UNDER UNCERTAINTY.

12. Theoretical-definitive exposition of the categorical apparatus for investigating the management of environmental safety in an enterprise

13. A Model for Implementing Digital Personnel Management in Security and Safety for Engineering Enterprises.

15. Analysis of the Problems of Industrial Enterprises Information Security Audit

16. Smart Assistants in IT Security – An Approach to Addressing the Challenge by Leveraging Assistants’ Specific Features

17. 제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구.

18. Theoretical and Methodological Basis of Management of Enterprise Development Security

19. Cyber-Warranties as a Quality Signal for Information Security Products

20. Enterprise network security from cloud computing perspective.

21. The Level of Security of the Enterprise’s Development as a Balance of Statics and Dynamics: Parameterization of the Main Indicators of Activity

22. Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models

23. Obfuscation and Diversification for Securing Cloud Computing

24. The System Analysis of Ensuring the Stability of Innovative and Digital Economy on the Basis of Intellectual Comprehensive Security System

25. Mobile fog based secure cloud-IoT framework for enterprise multimedia security.

26. Security Qualitative Metrics for Open Web Application Security Project Compliance.

27. Теоретико-методичний базис управління безпекою розвитку підприємства

28. Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights

30. Bibliography

31. Securing Business Data on Android Smartphones

33. Security Qualitative Metrics for Open Web Application Security Project Compliance.

34. A Model for Information Security Governance in Developing Countries

36. From MDM to DB2: A Case Study of Security Enforcement Migration

37. МЕТОДИЧНІ АСПЕКТИ ОЦІНЮВАННЯ РІВНЯ ФІНАНСОВОЇ БЕЗПЕКИ МАЛИХ ПІДПРИЄМСТВ

38. ОЦІНКА ЕКОНОМІЧНОЇ БЕЗПЕКИ ПІДПРИЄМСТВА НА БАЗІ КОНЦЕПЦІЇ VBM

40. Изменение политики кадровой безопасности на предприятии в условиях пандемии COVID-19

41. Arquitecturas de seguridad OT y protección mediante Deception

42. Levers of enterprise security control: a study on the use, measurement and value contribution.

43. Claims-Based Enterprise-Wide Access Control.

44. FACILITATING FORENSICS IN THE MOBILE MILLENNIUM THROUGH PROACTIVE ENTERPRISE SECURITY.

45. Impact of anti-phishing tool performance on attack success rates.

46. Técnicas y herramientas para el análisis de debilidades en volcados de memoria RAM de sistemas basados en Linux

47. Seguridad en redes empresariales: Protegiendo el acceso privilegiado

48. Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®.

49. A new comprehensive framework for enterprise information security risk management.

50. SCATTERED IDENTITIES- A GOVERNANCE NIGHTMARE!

Catalog

Books, media, physical & digital resources