Search Results - "Hadjina, N."
-
1
SECURCOM - the security solution for Ethernet LANs
Published in 11th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.02CH37379) (2002)“…The solution for Ethernet LAN security, using SECURCOM devices, is implemented through design requirements with special attention to network security. The…”
Get full text
Conference Proceeding -
2
Data security on Ethernet LANs
Published in 2000 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries. Proceedings. MeleCon 2000 (Cat. No.00CH37099) (2000)“…A software independent solution for Ethernet LAN security is given by introducing a hardware device between the protected host and network. The device gives…”
Get full text
Conference Proceeding -
3
Performance tuning of large-scale distributed WWW caches
Published in 2000 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries. Proceedings. MeleCon 2000 (Cat. No.00CH37099) (2000)“…World Wide Web (WWW) caches, such as the Harvest cache, its successor Squid, and a cache proposed by Malpani, Lorch, and Berger (1996) from the University of…”
Get full text
Conference Proceeding -
4
Methods and tools for the development of information security policy - A comparative literature review
Published in 2011 Proceedings of the 34th International Convention MIPRO (01-05-2011)“…Information security policy is primarily determined by the environment in which various information are being used and communicated. Such growing complexity of…”
Get full text
Conference Proceeding -
5
Information security governance and how to accomplish it
Published in 2011 Proceedings of the 34th International Convention MIPRO (01-05-2011)“…The risks and costs of information security, numerous external and internal requirements and obligations to customers, are the reason for the interest of…”
Get full text
Conference Proceeding -
6
Management accounting in hospital setting
Published in Liječnički vjesnik (01-12-1998)“…The periodic income and expenditure accounts produced at the hospital and departmental level enable successful short term management, but, in the long run do…”
Get more information
Journal Article -
7
Analysis of precision of the HTB packet scheduler
Published in 2005 18th International Conference on Applied Electromagnetics and Communications (2005)“…Network packet scheduling algorithms are used to provide QoS features. They are usually deployed in routers. Hierarchical token bucket packet scheduler is one…”
Get full text
Conference Proceeding