Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 61 - 80 von 125.328

61

MarketLine Company Profile: Palo Alto Networks Inc.
Palo Alto Networks, Inc. MarketLine Company Profile. 11/6/2024, p1-54. 54p.

COMPUTER security INTERNET security SANTA Clara (Calif.) PALO Alto Networks Inc.
62

Der neue Leitfaden »Security Use-Cases – ein Katalog«: ein Wegweiser für die effektive Erkennung von Cyberangriffen.
Schugardt, Dirk ; Dettweiler, Gerd ; Dreyer, Markus
IT-Governance. dez2025, Vol. 19 Issue 42, p31-35. 5p.

CYBERTERRORISM SECURITY systems RISK management in busin... INTERNET security CATALOGS DETECTION algorithms
Zeitschrift
63

Experts urge more support for nonprofit cybersecurity.
Corporate Philanthropy Report. Dec2025, Vol. 40 Issue 12, p1-12. 12p.

NONPROFIT organizations COMPUTER systems RISK management in busin... CYBERTERRORISM ORGANIZATIONAL learning CORPORATE giving
Zeitschrift
64

iOS 26 has a new iPhone security setting you need to turn on now.
HARTMANN, THOMAS
Macworld - Digital Edition. Dec2025, Vol. 42 Issue 12, p143-144. 2p. 2 Color Photographs.

DATA protection INTERNET security MOBILE operating systems
Zeitschrift
65

Windows Defender optimal nutzen.
FREIST, ROLAND
PC Welt Plus. 2025, Issue 12, p6-9. 4p.

COMPUTER security softwa... INTERNET security
Zeitschrift
66

Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen.
SHORTRIDGE, KELLY ; DYKSTRA, JOSIAH
Communications of the ACM. Jul2023, Vol. 66 Issue 7, p96-104. 9p. 1 Color Photograph, 2 Charts.

OPPORTUNITY costs DECISION making in busin... LABOR productivity RISK INTERNET security TWILIO Inc.
Zeitschrift
67

Activities of National Institute of Informatics in Japan.
MASARU KITSUREGAWA ; SHIGEO URUSHIDANI ; KAZUTSUNA YAMAJI ; et al.
Communications of the ACM. Jul2023, Vol. 66 Issue 7, p58-63. 6p. 8 Diagrams.

ARTIFICIAL intelligence INFORMATION networks TELECOMMUNICATION system... ALGORITHMS INTERNET security COMPUTER vision
Zeitschrift
68

SPECTRUM IT MODERNIZATION: NTIA Should Fully Incorporate Cybersecurity and Interoperability Practices.
D'Souza, Vijay A.
GAO Reports. 5/22/2025, preceding pi-38. 42p.

TELECOMMUNICATIONS servi... RISK management in busin... INFORMATION sharing INTERNET security INTERAGENCY coordination DATA management
Regierungsdokument
69

Linguistic analysis of cyber threats: A philological approach to AI-driven threat detection.
Mirzakhmedova, Khulkar ; Karimov, Nodir ; Sattorova, Zilola ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

ARTIFICIAL intelligence INTERNET security HUMAN error COMPUTER network securit... RISK assessment RANSOMWARE
Konferenz
70

Cybersecurity considerations for ethnotourism destinations: A comprehensive guide.
Sayfullaev, Durbek ; Odilov, Bobir ; Karimov, Nodir ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

INTERNET security TRAVEL safety CULTURAL property TOURISTS TOURISM HERITAGE tourism
Konferenz
71

Cybersecurity challenges for ethnotourism operators: Strategies for protection.
Odilov, Bobir ; Doniyorov, Alisher ; Sayfullaev, Durbek ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

INTERNET security DIGITAL technology HERITAGE tourism LEGAL liability CYBERTERRORISM TRAVELERS
Konferenz
72

Cyber security interference security system for decentralized cloud environment using Sniffer centric transmission control technique.
Vij, Priya ; Prashant, Patil Manisha
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-8. 8p.

INTERNET security INFORMATION technology s... FLOW control (Data trans... PEER-to-peer architectur... DATA integrity DATA packeting
Konferenz
73

Machine learning techniques and bio inspired techniques based of XSS attack detection and mitigation in cyber network.
Jaleel, Uruj ; Shrivastav, Mohit
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

MACHINE learning INTERNET security COMPARATIVE studies LEARNING classifier syst... WEBSITE security
Konferenz
74

AI-powered predictive maintenance for cybersecurity systems.
Haval, Abhijeet Madhukar ; Afzal, Md
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

INTERNET security DENIAL of service attack... SOCIOECONOMIC factors ARTIFICIAL intelligence INFORMATION technology s... COMMUNICATION infrastruc...
Konferenz
75

E-commerce platform: Building resilient cyber defence mechanisms.
Biswas, Debarghya ; Tiwari, Ankita
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

ELECTRONIC commerce INTERNET security PHISHING DATA protection ARTIFICIAL intelligence BLOCKCHAINS
Konferenz
76

AI-powered threat intelligence application in current and future trends.
Soni, Palvi ; Tandan, Gajendra
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

INTERNET security INTRUSION detection syst... ARTIFICIAL intelligence COMPUTER network securit... MALWARE prevention DATA transmission system...
Konferenz
77

A simulation-based approach toward detection and mitigation of flood attacks.
Dharmapuri, Vandana ; Velagaleti, Sesha Bhargavi ; Maddi, Sridevi ; et al.
AIP Conference Proceedings. 2025, Vol. 3361 Issue 1, p1-8. 8p.

DENIAL of service attack... INTERNET security COMPUTER network securit... FIREWALLS (Computer secu... COMPUTER software PYTHON programming langu...
Konferenz
78

Biases in Threat-Led Penetration Testing – maintaining the TIBER spirit under DORA.
Richter, Konrad ; Wellischowitsch, Romana
Financial Stability Report (Oesterreichische Nationalbank). Nov2025, Issue 50, p32-37. 6p.

COGNITIVE bias INTERNET security GROUPTHINK theory EUROPEAN Union
Report
79

The Surge of Crypto "Wrench" Crimes.
Parthemer, Mark R.
Journal of Financial Service Professionals; Nov2025, Vol. 79 Issue 6, p14-17, 4p

ASSET protection CRYPTOCURRENCY theft RISK assessment HAZARDS VIGILANCE (Psychology) INTERNET security
Fachzeitschrift
80

A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value.
Sawik, Tadeusz ; Sawik, Bartosz
International Journal of Production Research. Nov2022, Vol. 60 Issue 21, p6556-6572. 17p. 1 Diagram, 6 Charts, 2 Graphs.

SECURITY management INTERNET security STOCHASTIC programming EXPONENTIAL functions CONTROL (Psychology)
Fachzeitschrift

Filter