Zobrazeno 1 - 6
of 6
pro vyhledávání: '"M. T. Dlamini"'
Publikováno v:
International Transactions in Operational Research. 29:372-395
Publikováno v:
Proceedings of ISIC: the information behaviour conference Pretoria, South Africa, 28th September to 1st October, 2020.
Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction of digital deception can reveal challenges and initiatives and show how information behaviour exp
Publikováno v:
Computers & Security. 28:189-198
Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it
Publikováno v:
ICITST
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the data of other potentially conflicting tenants' by means of inter-VM attacks.
Publikováno v:
Enterprise Interoperability
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d302d993260c877fe53f211a5d6680c
https://doi.org/10.1002/9781118846995.ch4
https://doi.org/10.1002/9781118846995.ch4
Autor:
Jan H. P. Eloff, Madeleine Bihina Bella, Ernest Ketcha Ngassam, Donovan Isherwood, Maria Margaretha Eloff, M. T. Dlamini
The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::398c3888df6c04dc30295f62e357b39c
https://doi.org/10.4018/978-1-4666-6158-5.ch016
https://doi.org/10.4018/978-1-4666-6158-5.ch016