Sciweavers

2504 search results - page 60 / 501
» Enterprise Security Architecture
Sort
View
CHIMIT
2009
ACM
15 years 6 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
AUSFORENSICS
2003
15 years 1 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis

Book
310views
16 years 7 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose
DBTEL
2001
Springer
117views Database» more  DBTEL 2001»
15 years 4 months ago
Toward Universal Information Models in Enterprise Management
The DMTF’s recent work on management information modeling in the IP world has highlighted that a number of problems are still unsolved in this important area of enterprise manage...
Jean-Philippe Martin-Flatin
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 6 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...