نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
Dynamic and complex information security risks facing organizations are forcing them to take a hard look at outsourcing to Managed Security Service Providers (MSSPs). The potential advantage of outsourcing is to improve security levels at lower costs. Potential risks of outsourcing to an MSSP includes service quality uncertainty and the business risk of MSSP bankruptcy. In this paper we present...
Telemedicine refers to a kind of treatment in which all medical interventions, diagnoses, treatment decisions, and recommendations are made using the patient’s data, documents, and other information transmitted through telecommunication systems. Telemedicine might run between one patient and one physician or one patient and several physicians, including other healthcare specialists. Telemedicin...
With energy and power costs increasing as the size of IT infrastructures grows, virtualization technologies enable scalable management for large scale of virtual machines running on physical systems, and virtualizationbased green cloud computing paradigm is springing up to provide a scalable and energy-efficient network software application (NetApp in short) supplement, consumption, delivery mo...
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming...
, newly elected ukrainian parliament still unable to make any definite decision concerning possible head of ukrainian security service. Who comes to us with a sword dies from the sword. 1. Why ukrainian parliament decides the question of NATO membership 2. Who is responsible 3. Ukraine is a slavic country 4. Some further perspectives The following brief survey may be considered as some comments...
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks. Dynamic parameterization of IPsec, via the KeyNote trust management system, further enables security mechanisms to adjust the level of security service “on-the-fly” to respond to changing network and operational cond...
The perception of lack of control over resources deployed in the cloud may represent one of the critical factors for an organization to decide to cloudify or not its own services. The flat security features offered by commercial cloud providers to every customer, from simple practitioners to managers of huge amounts of sensitive data and services, is an additional problem. In recent years, the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید