Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus
Analizirati dostupna rješenja za zaštitu i kontrolu pristupa Internetu velike organizacije bio je os...
This thesis describes the design and implementation of ISMS to a particular high school. The aim is ...
Since the creation of computers and the web in the 1960s, the amount of usage and reliance people ha...
Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and...
Abstract:- Over the last few years, information and communication technologies have been increasingl...
The proliferation in the use of Internet has led to the emergence of a series of security threats ca...
The main purpose of this thesis is to investigate existing information security technologies and i...
This Thesis talks about the security threads that is a problem for any server, what is the best ways...
UTM is an application which integrated many security features become a single hardware platform. The...
Aspects of information infrastructure construction of educational institutions are examined and a li...
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security technique...
This thesis is dedicated to security of client-server applications running on Windows platform. In t...
The main topic of the thesis is problem of the security of the web application. Spheres that are lik...
The objective of this thesis is to review the need for information system security, evaluate the tec...
TITLE: Utilization of technical and informatical services for protection of property and individuals...
Analizirati dostupna rješenja za zaštitu i kontrolu pristupa Internetu velike organizacije bio je os...
This thesis describes the design and implementation of ISMS to a particular high school. The aim is ...
Since the creation of computers and the web in the 1960s, the amount of usage and reliance people ha...
Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and...
Abstract:- Over the last few years, information and communication technologies have been increasingl...
The proliferation in the use of Internet has led to the emergence of a series of security threats ca...
The main purpose of this thesis is to investigate existing information security technologies and i...
This Thesis talks about the security threads that is a problem for any server, what is the best ways...
UTM is an application which integrated many security features become a single hardware platform. The...
Aspects of information infrastructure construction of educational institutions are examined and a li...
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security technique...
This thesis is dedicated to security of client-server applications running on Windows platform. In t...
The main topic of the thesis is problem of the security of the web application. Spheres that are lik...
The objective of this thesis is to review the need for information system security, evaluate the tec...
TITLE: Utilization of technical and informatical services for protection of property and individuals...
Analizirati dostupna rješenja za zaštitu i kontrolu pristupa Internetu velike organizacije bio je os...
This thesis describes the design and implementation of ISMS to a particular high school. The aim is ...
Since the creation of computers and the web in the 1960s, the amount of usage and reliance people ha...