The use of hardware virtualization in the context of information security.
Denis V. SilakovPublished in: Program. Comput. Softw. (2012)
Keyphrases
- information security
- countermeasures
- computer security
- security issues
- information systems
- network security
- smart card
- information assurance
- information security management
- intrusion detection
- e government
- technical issues
- risk assessment
- security level
- databases
- low cost
- sensitive data
- smart grid
- cloud computing
- ibm zenterprise
- cyber defense
- embedded systems
- data acquisition
- operating system
- context aware
- iso iec
- design theory
- management practices
- object recognition
- decision making