1,416 results on '"Computer networks -- Safety and security measures"'
Search Results
152. Operation And Maintenance Market For The Regional Gazelle High-speed Electronic Communications Network
153. Operation And Maintenance Market For The Regional Gazelle High-speed Electronic Communications Network
154. 4 Key Capabilities of Business Endpoint Security VPNs
155. Avert the high price of security: keeping your district network safe from intruders doesn't have to gut your IT budget
156. Forget the silos, build the bridges
157. Wireless insecurities
158. Securing the data mountain
159. Hospital Information System - Increasing Security And Performance Of Computer Network In Hospital Vykov, After Ii
160. Hospital Information System - Increasing Security And Performance Of Computer Network In Hospital Vykov, Po Ii
161. Cybersecurity 202: The DNC and RNC are still vulnerable to hackers, new report finds
162. Huawei 5G row exposes deep divisions between branches of US security
163. Wavelet-based denial-of-service detection
164. Ensuring security on IBM mainframes: 'big iron' still holds the keys to the kingdom for many enterprises. That means it's more important than ever to keep security up to date
165. Networks need a new application delivery architecture: building a more responsive, secure infrastructure will result in higher user satisfaction
166. Getting to know your network - part III
167. Cooperating Security Managers: a peer-based intrusion detection system
168. Auditing user accounts
169. Sinkhole intrusion in mobile ad hoc networks: the problem and some detection indicators
170. Defending against spoofed DDoS attacks with path fingerprint
171. Confronting threats through unconventional means: offensive information warfare as a covert alternative to preemptive war.
172. A preliminary model of end user sophistication for insider threat prediction in IT systems
173. Implementing an effective abuse management process--part III
174. Cracking the security problem
175. Infection dynamics on the Internet
176. Protecting the Administrator account
177. Authentication and authorization infrastructure (AAIs): A comparative study
178. Enhanced three-party encrypted key exchange without server public keys
179. The top 12 tech issues: After a wide-ranging consultation with the profession, ITAC presents its comprehensive list of priorities facing CAs
180. Vulnerability forecasting -a conceptual model
181. Weaving a wireless safety net: relying on the pervasive technology network for security is potentially perilous when the technology fails
182. Building a secure wireless network using FreeRADIUS
183. An alternative architectural framework to the OSI security model
184. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
185. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
186. Rethinking network security: perimeter security is no longer good enough. Network security must be built in, not bolted on
187. Secure distributed computing
188. Computer insecurity
189. Authentication of mobile users
190. Wire pirates
191. Total security: because evildoers won't hesitate to exploit every loophole, blind spot, and unguarded entrance, you need
192. Analyzing security costs: quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs
193. Are school networks as safe as we think? The words 'Internet security' mean different things to different people. (Technology)
194. The threat from within.
195. Network security: safeguarding systems against the latest threats
196. Efficient anomaly detection by modeling privilege flows using hidden Markov model
197. A quantitative study of public key infrastructures
198. Dangerous dealings: reformed hackers want to lend a hand with your it security strategy. (Cover Story)
199. Improving public switched network security in an open environment
200. Perfectly secure message transmission
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.