: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
: The goal of this paper is to describe how the development, implementation, and deployment of Information System of University of Latvia changed the life of the University and fac...
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...