Zobrazeno 1 - 10
of 73
pro vyhledávání: '"InfoSECURITY"'
Publikováno v:
IEEE Photonics Journal, Vol 12, Iss 3, Pp 1-15 (2020)
Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital
Externí odkaz:
https://doaj.org/article/32e60df7a9f14dce8a96af11dad31c12
Publikováno v:
IEEE Access, Vol 8, Pp 61340-61354 (2020)
In recent years, several countries have increasingly promoted digital health to improve medical care quality and precision medicine. Concerns such as how to employ and manage medical data, including physiological signals and medical images, have emer
Externí odkaz:
https://doaj.org/article/1c61f15d7cf34339940e47072d0a40db
Publikováno v:
Computers in Libraries. Jun97, Vol. 17 Issue 6, p16. 2p.
Publikováno v:
IEEE Access, Vol 8, Pp 61340-61354 (2020)
In recent years, several countries have increasingly promoted digital health to improve medical care quality and precision medicine. Concerns such as how to employ and manage medical data, including physiological signals and medical images, have emer
Autor:
Sloan, Robert H., Warner, Richard
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethic
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/41680
Autor:
Varsalone, Jesse, McFadden, Matthew, Morrissey, Sean, Schearer, Michael, 'Kelly' Brown, James, 'TheXile' Smith, Ben, McCray, Joe
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circum
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/41766
Autor:
Fitzgerald, Todd, Peltier, Tom
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/41772
Autor:
Xiao, Yang
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement pr
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/41646
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.