Search

Your search keyword '"Computer networks -- Safety and security measures"' showing total 1,416 results

Search Constraints

Start Over You searched for: Descriptor "Computer networks -- Safety and security measures" Remove constraint Descriptor: "Computer networks -- Safety and security measures"
1,416 results on '"Computer networks -- Safety and security measures"'

Search Results

151. Post-Coronavirus Information Security: How Should You Reopen Your Firm?

154. 4 Key Capabilities of Business Endpoint Security VPNs

155. Avert the high price of security: keeping your district network safe from intruders doesn't have to gut your IT budget

156. Forget the silos, build the bridges

157. Wireless insecurities

158. Securing the data mountain

159. Hospital Information System - Increasing Security And Performance Of Computer Network In Hospital Vykov, After Ii

160. Hospital Information System - Increasing Security And Performance Of Computer Network In Hospital Vykov, Po Ii

161. Cybersecurity 202: The DNC and RNC are still vulnerable to hackers, new report finds

162. Huawei 5G row exposes deep divisions between branches of US security

163. Wavelet-based denial-of-service detection

164. Ensuring security on IBM mainframes: 'big iron' still holds the keys to the kingdom for many enterprises. That means it's more important than ever to keep security up to date

165. Networks need a new application delivery architecture: building a more responsive, secure infrastructure will result in higher user satisfaction

166. Getting to know your network - part III

168. Auditing user accounts

173. Implementing an effective abuse management process--part III

174. Cracking the security problem

175. Infection dynamics on the Internet

176. Protecting the Administrator account

178. Enhanced three-party encrypted key exchange without server public keys

179. The top 12 tech issues: After a wide-ranging consultation with the profession, ITAC presents its comprehensive list of priorities facing CAs

180. Vulnerability forecasting -a conceptual model

182. Building a secure wireless network using FreeRADIUS

183. An alternative architectural framework to the OSI security model

186. Rethinking network security: perimeter security is no longer good enough. Network security must be built in, not bolted on

187. Secure distributed computing

188. Computer insecurity

189. Authentication of mobile users

190. Wire pirates

192. Analyzing security costs: quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs

193. Are school networks as safe as we think? The words 'Internet security' mean different things to different people. (Technology)

194. The threat from within.

195. Network security: safeguarding systems against the latest threats

197. A quantitative study of public key infrastructures

198. Dangerous dealings: reformed hackers want to lend a hand with your it security strategy. (Cover Story)

200. Perfectly secure message transmission

Catalog

Books, media, physical & digital resources