Gotowa bibliografia na temat „Internet – security measures. sears”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Internet – security measures. sears”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Internet – security measures. sears"
McCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, nr 5 (maj 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Pełny tekst źródłaZhou, Zhong Wei, i Lei Shi. "Security Research and Measures for the Internet of Things". Advanced Materials Research 748 (sierpień 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Pełny tekst źródłaChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures". Applied Mechanics and Materials 241-244 (grudzień 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Pełny tekst źródłaNiu, Minghao, i Hong Dai. "Internet of Things Information Security and Preventive Measures". Academic Journal of Science and Technology 4, nr 2 (4.01.2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Pełny tekst źródłaGupta, Sanjay Kumar, i Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices". International Journal of Engineering Research and Technology 13, nr 8 (31.08.2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Pełny tekst źródłaWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures". Studies in Social Science Research 4, nr 3 (24.07.2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Pełny tekst źródłaSang, Yun Chang, i Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture". Advanced Materials Research 765-767 (wrzesień 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Pełny tekst źródłaМинаев, В. А., Б. А. Швырев i Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS". ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, nr 2(-) (30.06.2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Pełny tekst źródłaHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures". Highlights in Science, Engineering and Technology 68 (9.10.2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Pełny tekst źródłaGomes, Leandre, Abhinav Deshmukh i Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures". Journal of Information Technology and Sciences 8, nr 2 (14.07.2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Pełny tekst źródłaRozprawy doktorskie na temat "Internet – security measures. sears"
King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Pełny tekst źródłaNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Pełny tekst źródłaYu, Kin-ying, i 余見英. "Efficient schemes for anonymous credential with reputation support". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48330012.
Pełny tekst źródłapublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Pełny tekst źródłaRutherford, Andrew. "Introducing hippocratic log files for personal privacy control". Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.
Pełny tekst źródłaMarais, Terrence K. "Electronic payment and security on the Internet". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Pełny tekst źródłaENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Nagarle, Shivashankarappa A. "Novel framework to support information security audit in virtual environment". Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1.
Pełny tekst źródłaDe, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention". Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.
Pełny tekst źródłaENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
Dacosta, Italo. "Practical authentication in large-scale internet applications". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44863.
Pełny tekst źródłaClayton, Bradley. "Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost". Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.
Pełny tekst źródłaKsiążki na temat "Internet – security measures. sears"
Vacca, John R. Internet security SECRETS. Foster City, CA: IDG Books Worldwide, 1996.
Znajdź pełny tekst źródłaJ, Cooper Frederic, red. Implementing Internet security. Indianapolis, Ind: New Riders Pub., 1995.
Znajdź pełny tekst źródłaP, Cavanagh James, red. Internet and internetworking security. Boston, MA: Auerbach, 1997.
Znajdź pełny tekst źródłaLevine, John R. Internet privacy for dummies. New York, N.Y: Wiley Pub, 2002.
Znajdź pełny tekst źródłaHare, Chris. Internet firewallsand network security. Wyd. 2. Indianapolis, Ind: New Riders Publishing, 1996.
Znajdź pełny tekst źródłaWilliam, Stallings. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.
Znajdź pełny tekst źródłaStallings, William. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.
Znajdź pełny tekst źródłaHolden, Greg. Internet security in easy steps. Southam: Computer Step, 2002.
Znajdź pełny tekst źródłaZwicky, Elizabeth D. Building Internet Firewalls: Internet and Web security. Wyd. 2. Beijing: O'Reilly, 2000.
Znajdź pełny tekst źródłaPhoha, Vir V. A dictionary of Internet security. Berlin: Springer-Verlag, 2002.
Znajdź pełny tekst źródłaCzęści książek na temat "Internet – security measures. sears"
Vetrivel, S. C., R. Maheswari i T. P. Saravanan. "Industrial IOT: Security Threats and Counter Measures". W Internet of Things, 403–25. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3_20.
Pełny tekst źródłaWu, Chuan-Kun. "A Comprehensive Set of Security Measures for IoT". W Internet of Things Security, 199–245. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_12.
Pełny tekst źródłaEmran, Nurul A. "Data Completeness Measures". W Pattern Analysis, Intelligent Security and the Internet of Things, 117–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17398-6_11.
Pełny tekst źródłaKumhar, Dharamdas, Anil Kewat i Avanish Kumar. "Internet Security: Threats and Its Preventive Measures". W Lecture Notes in Electrical Engineering, 753–66. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2631-0_65.
Pełny tekst źródłaGoud, Teena, i Ajay Dureja. "Security Measures in Internet of Things (IoT) Systems Using Machine and Deep Learning Techniques". W Internet of Things, 195–209. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63937-2_11.
Pełny tekst źródłaPaul, Bonani. "Internet of Things (IoT), Three-Layer Architecture, Security Issues and Counter Measures". W ICT Analysis and Applications, 23–34. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5655-2_3.
Pełny tekst źródłaZheng, Changliang. "Computer Network Security and Effective Measures for the Era of Big Data". W Application of Big Data, Blockchain, and Internet of Things for Education Informatization, 521–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_64.
Pełny tekst źródłaJeremiah, Premylla, Ganthan Narayana Samy, Bharanidharan Shanmugam, Kannan Ponkoodalingam i Sundresan Perumal. "Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things". W Advances in Intelligent Systems and Computing, 726–35. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99007-1_67.
Pełny tekst źródłaVelmurugan, S., G. Shanthi, L. Raja i D. Subitha. "Threat Analysis and Security Measures for the Internet of Medical Things (IoMT): A Study". W Computational Intelligence and Blockchain in Biomedical and Health Informatics, 229–42. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003459347-16.
Pełny tekst źródłaNdaw, Marie, Gervais Mendy, Samuel Ouya i Diaraf Seck. "Quantify the Maturity of Internet Banking Security Measures in WAEMU (West African Economic and Monetary Union) Banks". W Innovation and Interdisciplinary Solutions for Underserved Areas, 125–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_11.
Pełny tekst źródłaStreszczenia konferencji na temat "Internet – security measures. sears"
Wu, Yuhong, i Xiangdong Hu. "Many Measures to Solve Industrial Internet Security Problems". W 2019 2nd International Conference on Safety Produce Informatization (IICSPI). IEEE, 2019. http://dx.doi.org/10.1109/iicspi48186.2019.9095906.
Pełny tekst źródłaNiraja, K. S., i Sabbineni Srinivasa Rao. "Security Challenges and Counter Measures in Internet of Things". W 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020. http://dx.doi.org/10.1109/iccci48352.2020.9104159.
Pełny tekst źródłaLykou, Georgia, Argiro Anagnostopoulou i Dimitris Gritzalis. "Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience". W 2018 Global Internet of Things Summit (GIoTS). IEEE, 2018. http://dx.doi.org/10.1109/giots.2018.8534523.
Pełny tekst źródła"ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME". W Applied Computing 2022 and WWW/Internet 2022. IADIS Press, 2022. http://dx.doi.org/10.33965/ac_icwi2022_202208c030.
Pełny tekst źródłaR, Omshith, Vemisetti Pavan Balaji, Rayapudi Venkata Rahul i Kumaran U. "Enhanced Security Measures for Image Privacy: Encryption Perspectives". W 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2024. http://dx.doi.org/10.1109/idciot59759.2024.10467544.
Pełny tekst źródłaYe, Chenghao, Praburam Prabhakar Indra i David Aspinall. "Retrofitting Security and Privacy Measures to Smart Home Devices". W 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939272.
Pełny tekst źródłaVerma, Vidushi, i Munish Bhatia. "Analysis of Security Measures on the Internet of Things based Applications". W 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2022. http://dx.doi.org/10.1109/icosec54921.2022.9951914.
Pełny tekst źródłaMahmoud, Rwan, Tasneem Yousuf, Fadi Aloul i Imran Zualkernan. "Internet of things (IoT) security: Current status, challenges and prospective measures". W 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2015. http://dx.doi.org/10.1109/icitst.2015.7412116.
Pełny tekst źródłaVerma, Hanisha, i Kaur Chahal. "A review on security problems and measures of Internet of Things". W 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250560.
Pełny tekst źródłaAmel, Gherbia, i Zehani Soraya. "Enhancing Security and Privacy Measures in Internet of Things (IoT) Implementations". W 2024 8th International Conference on Image and Signal Processing and their Applications (ISPA). IEEE, 2024. http://dx.doi.org/10.1109/ispa59904.2024.10536814.
Pełny tekst źródłaRaporty organizacyjne na temat "Internet – security measures. sears"
Payment Systems Report - June of 2021. Banco de la República, luty 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Pełny tekst źródła