The web has become an indispensable part of the people lives. Unfortunately, as the people dependency on the web increases, so does the interest of attackers in exploiting web applications and web-based information systems. Previous work in the field of web application security has mainly focused on the mitigation of ...Download Now
This chapter describes security threats that systems face when they are connected to the Internet. The authors discuss their security requirements, potential security threats and different mechanisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over ...Download Now
The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line services rapidly increased. Today, whole industry branches rely on the Internet to do business. Unfortunately, the success of the web has ...Download Now
Progress in research on data quality is slow and relevance of results for practice is low. Can an ontological analysis make significant contributions? The "Road block" in data quality research seems to be an ontological one. Approaching "Data quality" with an ordinary language philosophy method reveals the inherent contradiction in ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?