Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   2  
      Computer ScienceApplication Firewall
Joined-up government depends fundamentally on semantics---on the computable representation of meaning, so that data is associated with appropriate metadata from the start, and this association is maintained as the data is manipulated.... more
    • by 
    •   13  
      Computer ScienceOntologyMetadataXML
    • by 
    •   7  
      Computer ScienceAccess ControlSemantic WebDescription Logic
The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for an... more
    • by 
    •   5  
      Computer ScienceNetwork SecurityComputer SecurityInnovative Development
    • by 
    •   10  
      Computer ScienceInternet SecurityNetworkingSecurity Policy
—Recently the world of web applications has witnessed a huge wave of attacks that caused a lot of web applications to get defaced and for a lot of businesses to lose financially and to lose the integrity between those companies and their... more
    • by 
    •   9  
      Computer ScienceInformation SecurityComputer SecurityCyber Security