Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Database
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The article presents the results of the analysis of threats to safety of information in enterprises. How information is protected against publication, modification or being erased has also been taken into account. The objective of the analysis is to raise awareness of value of information and the role of security in an IT system.
EN
Cultural Studies done through journals and media provide the researcher with large amount of data which can occasionally create confusion or mistakes, if they are not classified and ordered in a rigorous way. This work aims to present our database, born to study Literary Criticism through the weekly magazine Destino, as an example of database’s application in Cultural History.
ES
Los Estudios Culturales a partir de la prensa periódica ofrecen al investigador una multitud de datos que, en ocasiones, puede generar confusión o errores, si no se clasifican y ordenan de forma rigurosa. Este trabajo pretende exponer la creación de una base de datos para el estudio de la crítica literaria en el semanario Destino, como ejemplo de utilización de esta herramienta en la Historia Cultural.
PL
W artykule podjęto temat porównywania jakości haseł za pomocą entropii informacyjnej. Wyszczególniono kluczowe regulacje prawne obowiązujące administratorów baz danych. Zaprezentowano niektóre metody przechwytywania i łamania haseł oraz omówiono elementarne zasady bezpieczeństwa, do których powinien stosować się każdy użytkownik komputera, w tym mnemotechniczne metody tworzenia silnych haseł. Przeprowadzono analizę zabezpieczeń procesów identyfikacyjnych siedmiu największych banków.
EN
The article is devoted to the comparison of the quality of entries by means of information entropy. One itemised the key legal regulations which the administrators of databases must follow. One presented certain methods of intercepting and breaking passwords and emphasised the fundamental principles of safety, which should be followed by each computer user, including the mnemonic methods of creating strong passwords. One conducted an analysis of the security systems of identification-related processes of seven major banks.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.