information security risk analysis
A framework for comparing different information security risk analysis methodologiesfree downloadOrganisations wanting to conduct information security risk analysis find selecting a methodology problematic. Currently there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in nature. These Information security risk analysis methods and research trends: AHP and fuzzy […]
information security testing
Technical guide to information security testing and assessmentfree downloadThe National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 200 Public Law 107-347. NIST is responsible for developing Security testing and assessment of vulnerability scanners in quest of current information […]
information security management
Information security management best practice based on ISO/IEC 17799free downloadSecurity matters have become an integral part of daily life, and organizations need to ensure that they are adequately secured. While legislatures enact corporate governance laws, more and more businesses are seeking assurance that their vendors and partners are properly Information security management : a new […]
information security
Attack modeling for information security and survivabilityfree downloadMany engineering disciplines rely on engineering failure data to improve their designs. Unfortunately, this is not the case with information system engineers, who generally do not use security failure data-particularly attack data-to improve the security and survivability of Corporate governance and information security free downloadThe purpose of this […]
Artificial immune recognition system
Artificial immune recognition system (AIRS): Revisions and refinementsfree downloadThis paper revisits the Artificial Immmune Recognition System (AIRS) that has been developed as an immuneinspired supervised learning algorithm. Certain unnecessary complications of the original algorithm are discussed and means of overcomming these Artificial immune recognition system (airs)-a review and analysisfree downloadThe natural immune system is a […]
Augmented Reality and Image Processing
Augmented Reality allows the user to maipulate the data and can add enhanced features (video, GPS tags) to the image taken. Implementation of Image processing using augmented reality free downloadAugmented reality is the new paradigm shift in this world of ever changing technological marvels. Augmented reality is the integration of virtual elements in real world […]
SAAS SOFTWARE AS A SERVICE
Delivering software as a service free downloadThe online delivery of software sometimes labeled software as a service has been a long- standing dream for some vendors and CIOs. The concept is simple and attractive: rather than buying a software license for an application such as enterprise resource planning Adoption of software as a service (SaaS) […]
high performance computing project
High Performance Computing most generally refers to the practice of aggregating computing power in a way that delivers much higher performance than one could get out of a typical desktop computer or workstation in order to solve large problems in science, engineering, or business. High Performance Computing Student Projects Asee peerfree download Commodity High Performance […]
high performance computing
High-performance computing has become indispensable for enterprises, scientific researchers, and government agencies to generate new discoveries and innovate breakthrough products and services. Hardware accelerators for information processing in high performance computing systemsfree downloadA frequent problem in information processing is the rapid extraction and subsequent analysis of subsets of data that have to be formed from […]
information network security
Constructing enterprise information network security risk management mechanism by ontologyfree downloadAlong with the development of information technology and internet, a lot of modern technology methods and tools are used to management. Therefore, it is an important discussion to information security risk management. In this paper, we buring up an ontology Modified GPT cryptosystem for information […]