AbstractTo reduce the risk of loss and destruction of information stored in a database, the management of an organization should use the implementation of various security methods.A comprehensive strategy to secure a database is more than data security. Usually, security events can be associated with the following action: illegal access to data confidentiality damage, damage to the integrity of data, loss of data availability. Loss of privacy of information, making them accessible to others without right of access is not visible in the database and does not require changes dedectabile database.This paper addresses these events to ensure database security
AbstractWith the rapid development of society and information technology, enterprises and institutio...
AbstractThe availability of accurate, up-to-date and timely transport and traffic information has be...
AbstractThe effective governance of intellectual assets in small and medium enterprises (SME) is a k...
AbstractGiven the current social and economic environment, critical infrastuctures and their protect...
AbstractIn recent years, with the development of computer and network technology, information system...
AbstractThe papers in this field point out the major role of the informatics systems, a component of...
AbstractThe purpose of this study is to synthesize the role of accounting policy making as a politic...
AbstractThe use of ICTs can help to produce information and make better decisions for effective disa...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
AbstractThis study will explore employee engagement as the key concept to winning the business compe...
AbstractThe purpose of this paper is to test the influences of corporate governance implementation t...
AbstractThe article presents results of a safety climate research in a production facility. Assuming...
AbstractA very severe issue in today's computing world is the ‘ACCESS’ to an authenticated user. The...
AbstractMissions, business functions, organizations, and nations are increasingly dependent on cyber...
AbstractIn this study, a nonlinear auto-regressive moving average (ARMA) model residuals method is p...
AbstractWith the rapid development of society and information technology, enterprises and institutio...
AbstractThe availability of accurate, up-to-date and timely transport and traffic information has be...
AbstractThe effective governance of intellectual assets in small and medium enterprises (SME) is a k...
AbstractGiven the current social and economic environment, critical infrastuctures and their protect...
AbstractIn recent years, with the development of computer and network technology, information system...
AbstractThe papers in this field point out the major role of the informatics systems, a component of...
AbstractThe purpose of this study is to synthesize the role of accounting policy making as a politic...
AbstractThe use of ICTs can help to produce information and make better decisions for effective disa...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
AbstractThis study will explore employee engagement as the key concept to winning the business compe...
AbstractThe purpose of this paper is to test the influences of corporate governance implementation t...
AbstractThe article presents results of a safety climate research in a production facility. Assuming...
AbstractA very severe issue in today's computing world is the ‘ACCESS’ to an authenticated user. The...
AbstractMissions, business functions, organizations, and nations are increasingly dependent on cyber...
AbstractIn this study, a nonlinear auto-regressive moving average (ARMA) model residuals method is p...
AbstractWith the rapid development of society and information technology, enterprises and institutio...
AbstractThe availability of accurate, up-to-date and timely transport and traffic information has be...
AbstractThe effective governance of intellectual assets in small and medium enterprises (SME) is a k...