Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Syed (Shawon) M. Rahman"'
Healthcare Information Technology (IT) has made great advances over the past few years and while these advances have enable healthcare professionals to provide higher quality healthcare to a larger number of individuals it also provides the criminal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3611838c5871a8903b298c35deb90a36
Publikováno v:
International journal of Computer Networks & Communications. 5:19-33
Autor:
Marc A. Rader, Syed (Shawon) M. Rahman
Publikováno v:
International Journal of Network Security & Its Applications. 5:23-41
Autor:
Syed (Shawon) M. Rahman, Robert Lackey
Publikováno v:
International Journal of Network Security & Its Applications. 5:193-210
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with
Autor:
Syed Shawon M. Rahman, Jason Slaughter
Publikováno v:
International Journal of Computer Science and Information Technology. 3:1-15
The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller enterprises that lacksecurity guidelines.The authors believethis paper will assist users to write an individualized security plan. In addition to provi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::31b7d619ee8e48e0567b3aa2537a600f
Autor:
Marc A. Rader, Syed (Shawon) M. Rahman
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to mitigate and re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f1cc92c90b0781126df7348f5f56def
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319009506
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller enterprises that lack of security guidelines. We believe this paper will assist users to write an individualized security plan. We have also provided t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2d230e393aec4560942acbf4d69167d1
https://doi.org/10.1007/978-3-319-00951-3_3
https://doi.org/10.1007/978-3-319-00951-3_3
Autor:
Rice, Lee E., Syed (Shawon) M. Rahman
The need for information security within small to mid-size companies is increasing. The risks of information security breach, data loss, and disaster are growing. The impact of IT outages and issues on the company are unacceptable to any size busines
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c090b5486eb9ad8d8070bc80ea7b111
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrast
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::385fad7c6143ba28855036daf5db0804
http://arxiv.org/abs/1111.1771
http://arxiv.org/abs/1111.1771