1,904 results on '"Trojan horse"'
Search Results
152. Mechanisms of fungal dissemination
153. Monogenic susceptibility to live viral vaccines
154. Transepithelial Migration by Toxoplasma
155. Discussion and Conclusion
156. Building Long-Term Manufacturer-Retailer Relationships through Strategic Human Resource Management Policies: A System Dynamics Approach
157. ‘Developing’ Political Economies and Global Consumer Society
158. Round Table
159. Why are so Many Bees but so Few Digger Wasps Social? The Effect of Provisioning Mode and Helper Efficiency on the Distribution of Sociality Among the Apoidea
160. History, Concepts, and Technology of Networks and Their Security
161. On the Premises of French Contemporary Dance: Concepts, Collectivity and ‘Trojan Horses’ in the Work of Jérôme Bel and Loïc Touzé
162. The ‘Everything But Arms’ Initiative
163. The Trojan Horse Method: A Nuclear Physics Tool for Astrophysics
164. Assumptions: The Trojan Horses of Secure Protocols
165. Basic Security Concepts
166. Malicious Software in Ubiquitous Computing
167. Culture and Communication in Inter-American Relations: The Current State of an Asymmetric Debate
168. Cooperative Component Testing Architecture in Collaborating Network Environment
169. Internet-Voting: Opportunity or Threat for Democracy?
170. Spam and its economic significance
171. Network Security
172. Dangers
173. Operating Systems that Pose Security Risks
174. Basic Security Issues
175. Trojan Horse Socialism
176. Jonathan Swift and the Idea of the Fundamental Church
177. Trusted Computing, or the Gatekeeper
178. STERNE UND WELTRAUM - A POPULAR MAGAZINE DEVOTED TO SCIENCE AND ITS USE IN SCHOOL TEACHING
179. Definitions and Timeline
180. IA and Software
181. The Theory of Risks
182. Learning to Detect Malicious Executables
183. Multilateral Security: Enabling Technologies and Their Evaluation
184. Trojan Horse Attack Strategy on Quantum Private Communication
185. Study of the 9Be(p, α)6Li reaction via the Trojan Horse Method
186. Validity test of the Trojan Horse Method applied to the 7Li + p → α + α reaction via the 3He break-up
187. Indirect techniques in nuclear astrophysics : Asymptotic Normalization Coefficient and Trojan Horse
188. The Financing of Terrorism: a Trojan Horse
189. Trojan Horses
190. Examples of Malware
191. Viruses
192. Spyware
193. A Short Guide to Information Security
194. The Information Warfare Wireless Network Security Arsenal of the Future
195. Do Not Ship, or Receive, Trojan Horses : Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems
196. In-Kernel Cryptographic Executable Verification
197. Personal Security Checklist
198. Taxonomy, Techniques and Tools
199. F. Cohen and L. Adleman’s Formalization (1984 – 1989)
200. Security of Healthcare Information Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.