Penetration Tools To Prevent Organizational Data Security Breaches
Keywords: Cyber attack, security, enterprise information security, cyber secucity policy, state
Article no: 27
Pages 327-336
Keywords: Cyber attack, security, enterprise information security, cyber secucity policy, state
Article no: 27
Pages 327-336
Keywords: Information security tools, information security threats, system vulnerabilities, organization security, cost-effectiveness assessment, return on security investment (ROSI)
Article no: 60
Pages 479-484
Keywords: North Caucasus, power, political elites, political governance, conflicts, information security
Article no: 517
Pages 3899-3903
Keywords: Minors, information security, information sphere, risks, counteraction
Article no: 201
Pages 1527-1534
Keywords: Information, information technology, information security, public services, public authorities, services
Article no: 93
Pages 703-708
Keywords: Digital state, artificial intelligence, robotics, information security, legal regulation.
Article no: 359
Pages 2671-2676
Keywords: Digital signature, enciphering, information security, information security, information threat, information war
Article no: 5
Pages 38-44
Keywords: Information security, terrorism threats, virtual analogization, information environment, cryptanalysis, information influence of terrorism threats.
Article no: 27
Pages 190-196
Keywords: Information security, information technologies, social determination, society, state information policy
Article no: 75
Pages 560-569
Keywords: Сhild, information, information security, manipulative influence, protection
Article no: 86
Pages 808-814