84-01-20.1 Implementing AS/400 Security Controls
نویسنده
چکیده
منابع مشابه
87-01-90 Establishing Security Controls in a Distributed Data Base
Distributed computing systems can provide benefits not available with centralized computing systems. However, it can be difficult to maintain the security and integrity of data on distributed systems. In fact, some characteristics of distributed data bases give rise to additional security concerns. This article provides a detailed analysis of information security issues in the distributed data ...
متن کاملDesigning a Home Security System using Sensor Data Fusion with DST and DSMT Methods
Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...
متن کامل52-30-01 X.400 Versus SMTP
X.400 and SMTP/MIME are the subject of much canonical debate in the messaging community. Although the general consensus is that X.400 offers better functionality than SMTP/MIME as an E-mail protocol, the decision to use X.400 or SMTP/MIME must be based not only on their functionality but also other issues such as security, systems management, message management, human resources requirements, an...
متن کاملمطالعه رابطه نگرش، ادراک و انگیزش کارکنان با موفقیت سیاست و برنامههای خصوصیسازی
In the late 1970s, Thatcher's government in UK launched and used the privatization of state-owned enterprises as an instrument to help modernize the unproductive UK economy. Then, growing by an economic tide in 1990s, it was known as a very important tool in the process of economic change of world's different countries from planned and governmental economy toward liberal and market economy. The...
متن کاملThe Adoption of IT Security Standards in a Healthcare Environment
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just su...
متن کامل