The threat of patens "hold up," in which patent holders demand compensation from implementers of technical standards following wide-scale adoption of those standards, has focused significant governmental, academic and industry attention on means for averting such scenerios.
The threat of patens "hold up," in which patent holders demand compensation from implementers of technical standards following wide-scale adoption of ...
The tested tool acquired all visible and hidden sectors completely and accurately from the test media. In the case of a hard drive with 22 defective sectors, the sectors of the image corresponding to the defective sectors were replaced with forensically benign content.
The tested tool acquired all visible and hidden sectors completely and accurately from the test media. In the case of a hard drive with 22 defective s...
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the National Institute of Standards and Technology's (NIST's) Office of Law Enforcement Standards and Information Technology Laboratory. CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, the U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of...
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organiz...
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means to access such information over wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. However, motivating users to enable simple PIN or password...
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants (PDAs), which tend to be ...
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely. Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. Smart cards have...
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technolo...
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many practical problems remain to be solved. Yet the theory of quantum computing has advanced significantly in the past decade, and is becoming a significant discipline in itself. This article explains the concepts and basic mathematics behind quantum computers and some of the promising approaches for building them. We also discuss quantum...
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no qu...
This book uses input-output data from the World Input-Output Database to track the intermediate goods and services used in national manufacturing industries. Specifically, it examines the extent that supply chains increasingly involve imports and the extent that this trend has changed for the U.S. and other countries. The U.S. data is compared to 39 other countries between 1995 and 2009, a 15 year period. The 40 countries represented approximately 88 % of global manufacturing value added in 2009, according to United Nations data. In terms of 2009 imported supply chain value added used by a...
This book uses input-output data from the World Input-Output Database to track the intermediate goods and services used in national manufacturing indu...
NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," and catalogs security controls for all U.S. federal information systems except those related to national security. It is published by the National Institute of Standards and Technology, which is a non-regulatory agency of the United States Department of Commerce. NIST develops and issues standards, guidelines, and other publications to assist federal agencies in implementing the Federal Information Security Management Act of 2002 (FISMA) and to help with managing cost effective...
NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," and catalogs security controls for...