scispace - formally typeset
Search or ask a question
Author

Jr. Bernard P. Zajac

Bio: Jr. Bernard P. Zajac is an academic researcher from Metropolitan Water Reclamation District of Greater Chicago. The author has contributed to research in topics: Relevant cost & Tax rate. The author has an hindex of 3, co-authored 11 publications receiving 154 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: The high-velocity air injection, the same being a purposely-directed, swirl-generating, injection, according to the method or valving arrangement, induces an enhanced air-fuel admixing in the cylinder.

6 citations

Journal ArticleDOI
TL;DR: In the movie "War Games", two teenagers break into the United States Air Force's missile launch computers via a modem via an autodialer, which is alive and well and can be found on many bulletin boards.

3 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Journal ArticleDOI
TL;DR: A new model of computer abuse is proposed that extends the traditional model with the social criminology theories and explains the phenomenon through social lenses such as social bonds and social learning, focusing on computer abuse within organizations.
Abstract: Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.

212 citations

01 Jan 2016
TL;DR: In this paper, the authors proposed a method to compute the probability of a given node having a negative value for a given value of 0, i.e., a node having no negative value is 0.
Abstract: Для числа ε > 0 и вещественной функции f на отрезке [a, b] обозначим через N(ε, f, [a, b]) супремум множества тех номеров n, для которых в [a, b] существует набор неналегающих отрезков [ai, bi], i = 1, . . . , n, таких, что |f(ai)− f(bi)| > ε для всех i = 1, . . . , n (sup ∅ = 0). Доказана следующая теорема: если {fj} – поточечно ограниченная последовательность вещественных функций на отрезке [a, b] такая, что n(ε) ≡ lim supj→∞N(ε, fj , [a, b]) < ∞ для любого ε > 0, то {fj} содержит подпоследовательность, которая всюду на [a, b] сходится к некоторой функции f такой, что N(ε, f, [a, b]) 6 n(ε) при любом ε > 0. Показано, что основное условие в этой теореме, связанное с верхним пределом, необходимо для равномерно сходящейся последовательности {fj} и “почти” необходимо для всюду сходящейся последовательности измеримых функций и что многие поточечные принципы выбора, обобщающие классическую теорему Хелли, вытекают из этой теоремы, а также приводятся примеры, иллюстрирующие ее точность. Библиография: 16 названий.

188 citations

Journal ArticleDOI
TL;DR: Through the use of convergent factoring analysis, this paper identifies ten DRP CSFs for ISF, they are: DRP documentations, DRP steering committee and DRP testing, DRp policy and goals,DRP training, DRB maintenance and staff involvement, DRPs minimum IS processing requirements, top management commitment to DRP, prioritization IS functions/services, external, off‐site back‐up system, and internal.
Abstract: Purpose – Recent disaster recovery planning (DRP) literature has mainly focused on qualitative research, while neglecting the quantification of critical success factors (CSFs) for information systems function (ISF). This paper aims to address this issue.Design/methodology/approach – This paper first conducts an extensive literature review, and then identifies 62 DRP measurement items for ISF. A questionnaire survey, which is based on these 62 measurement items, is used for data collection, and 129 managers of DRP in ISF participate in this paper.Findings – Through the use of convergent factoring analysis, this paper identifies ten DRP CSFs for ISF, they are: DRP documentations, DRP steering committee and DRP testing, DRP policy and goals, DRP training, DRP maintenance and staff involvement, DRP minimum IS processing requirements, top management commitment to DRP, prioritization IS functions/services, external, off‐site back‐up system, and internal, and on‐site back‐up system.Originality/value – This paper...

48 citations

Journal ArticleDOI
01 Dec 2009
TL;DR: A virus propagation model, namely E-SEIR, is presented to gain insights of virus propagation in networks with Point-to-Group (P2G) information sharing patterns and some key managerial insights that are helpful for the practice of virus propagate control in information sharing networks are revealed.
Abstract: Nowadays, for information systems at organizational and interorganizational levels, information sharing is essential for business operations and strategic decision-making. As a mixed blessing, however, the information sharing process also exposes information systems to more severe virus attacks. In light of this, research efforts on virus propagation and virus control have drawn increasing interests in both the academic and industrial domains. This paper thus presents a virus propagation model, namely E-SEIR, to gain insights of virus propagation in networks with Point-to-Group (P2G) information sharing patterns. Unlike most existing virus propagation models, E-SEIR has three important characteristics. First, an additional exposed state is integrated into the model to describe the latent period of computer viruses. Second, a P2G infection function is introduced to the model to characterize the real-world networks, which consist of many information-sharing sub-networks. Third, E-SEIR takes various antivirus countermeasures into consideration, which provides unique opportunities for studying the behaviors of virus propagation with the presence of antivirus activities. Based on this E-SEIR model, we have studied the possibility of short-term virus outbreaks and long-term network survivability, and the results revealed some key managerial insights that are helpful for the practice of virus propagation control in information sharing networks.

43 citations