Sciweavers

2363 search results - page 96 / 473
» How Secure is RFID
Sort
View
CHIMIT
2007
ACM
15 years 8 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
COMSIS
2006
141views more  COMSIS 2006»
15 years 4 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
145
Voted
SEDE
2010
15 years 2 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
115
Voted
NGC
2002
Springer
15 years 4 months ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert
SIGCSE
2005
ACM
129views Education» more  SIGCSE 2005»
15 years 10 months ago
Teaching students to hack: curriculum issues in information security
1 Teaching “hacking” as a legitimate means of training students in how to protect a future employer’s data assets has been introduced
Patricia Y. Logan, Allen Clarkson