Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Global Information Assurance Certification
Known as:
GISF
, GCIH
, GIAC Information Security Fundamentals
Expand
Global Information Assurance Certification (GIAC) is an information security certification entity that specialises in technical and practical…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Computer security
Information security operations center
SANS Institute
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Development of Information Security Education Framework for Information Security Employees: A Case of Educational Institutions
Eun-Ju Lee
,
Hyo-Jung Jun
,
Tae-Sung Kim
,
Yeon-Bok Kim
2014
Corpus ID: 155038204
Following the heightened facilitation of information system in the education field, educational institutions encounter frequent…
Expand
2013
2013
A probabilistic and deterministic modular algorithm for computing Groebner basis over $\Q$
Bernard Parisse
arXiv.org
2013
Corpus ID: 7380709
Modular algorithm are widely used in computer algebra systems (CAS), for example to compute efficiently the gcd of multivariate…
Expand
2012
2012
Global Information Assurance Certification Paper Interested in Learning More? Attributes of Malicious Files Attributes of Malicious Files 2
J. Yonts
2012
Corpus ID: 8195169
Malware has become a common component to most modern intrusions. Confirming a system is infected or finding the attacker…
Expand
2010
2010
Analyzing Malicious Software
Lenny Zeltser
2010
Corpus ID: 166711865
Lenny Zeltser leads the security consulting practice at Savvis and is a member of the Board of Directors at SANS Technology…
Expand
2008
2008
GIAC Certified Intrusion Analyst (GCIA) Gold
C. Wright
2008
Corpus ID: 59721662
2004
2004
Jordan Normal and Rational Normal Form Algorithms
Bernard Parisse
,
M. Vaughan
arXiv.org
2004
Corpus ID: 15074687
In this paper, we present a determinist Jordan normal form algorithms based on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B…
Expand
Review
2002
Review
2002
IT Security for Automation Systems - Motivations and Mechanisms
M. Naedele
PEARL
2002
Corpus ID: 1787606
The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for…
Expand
Review
1999
Review
1999
Didymodon australasiae var. umbrosus in the Czech Republic, with a review of recent records from Central Europe
J. Kučera
1999
Corpus ID: 85130953
In March 1997 my colleague B. Buryova collected a moss which was not known to her, at Ratotin near Prague (Czech Republic). I…
Expand
1996
1996
Sighes and Teares Make Life to Last: The Purgation of Grief and Death Through Trope in the English Ayre
Daniel T. Fischlin
1996
Corpus ID: 190166899
Harvey Gross has convincingly argued that "[t]he lute-ayre flour ished during the two opening decades of the seventeenth century…
Expand
1989
1989
Bryoerythrophyllum ferruginascens (Stirt.) Giac. (Pottiaceae, Bryales) nieuw voor de Belgische en Zwitserse mosflora
T. Arts
1989
Corpus ID: 132029663
Cette espece rare et nouvelle pour la Belgique et la Suisse est illustree et decrite. Les differences avec B. recurvirostrum, sa…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required