Search Results - "Hadjina, N."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    SECURCOM - the security solution for Ethernet LANs by Hadjina, N.

    “…The solution for Ethernet LAN security, using SECURCOM devices, is implemented through design requirements with special attention to network security. The…”
    Get full text
    Conference Proceeding
  2. 2

    Data security on Ethernet LANs by Hadjina, N., Thompson, P.

    “…A software independent solution for Ethernet LAN security is given by introducing a hardware device between the protected host and network. The device gives…”
    Get full text
    Conference Proceeding
  3. 3

    Performance tuning of large-scale distributed WWW caches by Srbljic, S., Milanovic, A., Hadjina, N.

    “…World Wide Web (WWW) caches, such as the Harvest cache, its successor Squid, and a cache proposed by Malpani, Lorch, and Berger (1996) from the University of…”
    Get full text
    Conference Proceeding
  4. 4

    Methods and tools for the development of information security policy - A comparative literature review by Klaic, A., Hadjina, N.

    “…Information security policy is primarily determined by the environment in which various information are being used and communicated. Such growing complexity of…”
    Get full text
    Conference Proceeding
  5. 5

    Information security governance and how to accomplish it by Sajko, M., Hadjina, N., Sedinic, I.

    “…The risks and costs of information security, numerous external and internal requirements and obligations to customers, are the reason for the interest of…”
    Get full text
    Conference Proceeding
  6. 6

    Management accounting in hospital setting by Brzović, Z, Richter, D, Simunić, S, Bozić, R, Hadjina, N, Piacun, D, Harcet, B

    Published in Liječnički vjesnik (01-12-1998)
    “…The periodic income and expenditure accounts produced at the hospital and departmental level enable successful short term management, but, in the long run do…”
    Get more information
    Journal Article
  7. 7

    Analysis of precision of the HTB packet scheduler by Ivancic, D., Hadjina, N., Basch, D.

    “…Network packet scheduling algorithms are used to provide QoS features. They are usually deployed in routers. Hierarchical token bucket packet scheduler is one…”
    Get full text
    Conference Proceeding