Skip to search formSkip to main contentSkip to account menu

Global Information Assurance Certification

Known as: GISF, GCIH, GIAC Information Security Fundamentals 
Global Information Assurance Certification (GIAC) is an information security certification entity that specialises in technical and practical… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Following the heightened facilitation of information system in the education field, educational institutions encounter frequent… 
2013
2013
Modular algorithm are widely used in computer algebra systems (CAS), for example to compute efficiently the gcd of multivariate… 
2012
2012
Malware has become a common component to most modern intrusions. Confirming a system is infected or finding the attacker… 
2010
2010
Lenny Zeltser leads the security consulting practice at Savvis and is a member of the Board of Directors at SANS Technology… 
2004
2004
In this paper, we present a determinist Jordan normal form algorithms based on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B… 
Review
2002
Review
2002
The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for… 
Review
1999
Review
1999
In March 1997 my colleague B. Buryova collected a moss which was not known to her, at Ratotin near Prague (Czech Republic). I… 
1996
1996
Harvey Gross has convincingly argued that "[t]he lute-ayre flour ished during the two opening decades of the seventeenth century… 
1989
1989
Cette espece rare et nouvelle pour la Belgique et la Suisse est illustree et decrite. Les differences avec B. recurvirostrum, sa…