ºÝºÝߣshows by User: AdeAjasa / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: AdeAjasa / Tue, 03 Jul 2018 02:51:38 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: AdeAjasa Systematic Literature Review of Information Security Risk Assessment /slideshow/systematic-literature-review-of-information-security-risk-assessment/104017705 g1-180703025138
This is a systematic literature review (SLR) regarding information security and risk assessment and this is to collect, analyse and generate an overview of what has been gathered from existing papers after they have been read to generate a new SLR study. The paper would investigate and discuss the information security risk assessment via the methodologies described and implemented within an organisation/ company or business as well as the advantages and disadvantages of these methods including the area of application these methods were validated from.]]>

This is a systematic literature review (SLR) regarding information security and risk assessment and this is to collect, analyse and generate an overview of what has been gathered from existing papers after they have been read to generate a new SLR study. The paper would investigate and discuss the information security risk assessment via the methodologies described and implemented within an organisation/ company or business as well as the advantages and disadvantages of these methods including the area of application these methods were validated from.]]>
Tue, 03 Jul 2018 02:51:38 GMT /slideshow/systematic-literature-review-of-information-security-risk-assessment/104017705 AdeAjasa@slideshare.net(AdeAjasa) Systematic Literature Review of Information Security Risk Assessment AdeAjasa This is a systematic literature review (SLR) regarding information security and risk assessment and this is to collect, analyse and generate an overview of what has been gathered from existing papers after they have been read to generate a new SLR study. The paper would investigate and discuss the information security risk assessment via the methodologies described and implemented within an organisation/ company or business as well as the advantages and disadvantages of these methods including the area of application these methods were validated from. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/g1-180703025138-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a systematic literature review (SLR) regarding information security and risk assessment and this is to collect, analyse and generate an overview of what has been gathered from existing papers after they have been read to generate a new SLR study. The paper would investigate and discuss the information security risk assessment via the methodologies described and implemented within an organisation/ company or business as well as the advantages and disadvantages of these methods including the area of application these methods were validated from.
Systematic Literature Review of Information Security Risk Assessment from Ade Ajasa
]]>
586 0 https://cdn.slidesharecdn.com/ss_thumbnails/g1-180703025138-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An evaluation of Docker’s security /slideshow/an-evaluation-of-dockers-security/88030455 ade-180215055524
MSc Information Security and Digital Forensics]]>

MSc Information Security and Digital Forensics]]>
Thu, 15 Feb 2018 05:55:24 GMT /slideshow/an-evaluation-of-dockers-security/88030455 AdeAjasa@slideshare.net(AdeAjasa) An evaluation of Docker’s security AdeAjasa MSc Information Security and Digital Forensics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055524-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MSc Information Security and Digital Forensics
An evaluation of Docker’s security from Ade Ajasa
]]>
320 0 https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055524-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Testing The Effectiveness Of AppArmor /AdeAjasa/testing-the-effectiveness-of-apparmor ade-180215055346
BSc (Hons) Computer Networks]]>

BSc (Hons) Computer Networks]]>
Thu, 15 Feb 2018 05:53:46 GMT /AdeAjasa/testing-the-effectiveness-of-apparmor AdeAjasa@slideshare.net(AdeAjasa) Testing The Effectiveness Of AppArmor AdeAjasa BSc (Hons) Computer Networks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055346-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BSc (Hons) Computer Networks
Testing The Effectiveness Of AppArmor from Ade Ajasa
]]>
1327 0 https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055346-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/g1-180703025138-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/systematic-literature-review-of-information-security-risk-assessment/104017705 Systematic Literature ... https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055524-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/an-evaluation-of-dockers-security/88030455 An evaluation of Docke... https://cdn.slidesharecdn.com/ss_thumbnails/ade-180215055346-thumbnail.jpg?width=320&height=320&fit=bounds AdeAjasa/testing-the-effectiveness-of-apparmor Testing The Effectiven...