The article considers models of information security of small and medium – sized businesses taking into account sources of threats that affect information security
Over the last few years, the advances in information technology have brought many changes to the bus...
The article presents cyber security aspect in terms of information resource protection taking into a...
The article describes actual view for threats which threaten information systems. There are various ...
Information is the factor which can decide about the potential and market value of a company. An inc...
This thesis discusses information security management and information security management systems in...
The aim of this master‘s thesis is the description of the information security implementation into a...
He article describes and analyzes the basic principles of security software used in the operation of...
The subject of research involves theoretical issues, methodological provisions and applied aspects f...
Information security in BIM (Building Information Model) platforms is crucial, especially for missio...
Information systems security is rapidly becoming a growing concern for businesses of all sizes. As s...
The most common types of threats, as well as attacks and intrusion methods were analyzed. Adaptive S...
The article outlines the concept of maintaining the required security level of the information syste...
Information security covers many areas within an enterprise. Each area has security vulnerabilities ...
this article describes such concepts as the concept of information, types of information, threats to...
One of the urgent tasks is the development of information security measures. This article describes...
Over the last few years, the advances in information technology have brought many changes to the bus...
The article presents cyber security aspect in terms of information resource protection taking into a...
The article describes actual view for threats which threaten information systems. There are various ...
Information is the factor which can decide about the potential and market value of a company. An inc...
This thesis discusses information security management and information security management systems in...
The aim of this master‘s thesis is the description of the information security implementation into a...
He article describes and analyzes the basic principles of security software used in the operation of...
The subject of research involves theoretical issues, methodological provisions and applied aspects f...
Information security in BIM (Building Information Model) platforms is crucial, especially for missio...
Information systems security is rapidly becoming a growing concern for businesses of all sizes. As s...
The most common types of threats, as well as attacks and intrusion methods were analyzed. Adaptive S...
The article outlines the concept of maintaining the required security level of the information syste...
Information security covers many areas within an enterprise. Each area has security vulnerabilities ...
this article describes such concepts as the concept of information, types of information, threats to...
One of the urgent tasks is the development of information security measures. This article describes...
Over the last few years, the advances in information technology have brought many changes to the bus...
The article presents cyber security aspect in terms of information resource protection taking into a...
The article describes actual view for threats which threaten information systems. There are various ...