Improving the Information Security Audit Using XML Technologies

dc.contributor.authorGolyash, I.
dc.contributor.authorSachenko, S.
dc.contributor.authorRippa, S.
dc.contributor.authorГоляш, Ірина
dc.date.accessioned2017-10-25T21:10:09Z
dc.date.available2017-10-25T21:10:09Z
dc.date.issued2011
dc.description.abstractThere are described types of security threats to enterprise activity in the field of information technologies along with two ways of comparing possible costs for establishing a security system. Four main stages of auditing an enterprise information security using methods of expert examination with the XML orientation have been considered.uk_UA
dc.identifier.citationGolyash I. Improving the Information Security Audit Using XML Technologies / I.Golyash, S. Rippa, S.Sachenko // IEEE Inretnational Conference on Intelligent Data Acquisition and Advanced Computing Systems:Technology and Applications 2011, Prague, Czech Republik, September 15-17, 2011, - P.933-937uk_UA
dc.identifier.urihttp://dspace.tneu.edu.ua/handle/316497/23705
dc.language.isoenuk_UA
dc.subjectaudituk_UA
dc.subjectinformation technologiesuk_UA
dc.subjectinformation securityuk_UA
dc.subjectsoftwareuk_UA
dc.subjectXMLuk_UA
dc.subjectXBRLuk_UA
dc.subjectSemantic Webuk_UA
dc.titleImproving the Information Security Audit Using XML Technologiesuk_UA
dc.typeArticleuk_UA

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
i11-237_22d7fa71 +.pdf
Size:
301.71 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.37 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections