Showing 1 - 20 results of 99 for search 'NETWORK SECURITY', query time: 0.80s Refine Results
  1. 1
    by Chih-Hsiung Lin, 林志雄
    Published 2006
    ... to public or home networks can become infected with malware. Once these users connect their computers...
    Get full text
    Others
  2. 2
    by Guan-Yu Hou, 侯冠宇
    Published 2013
    ... network together. This study is on base of the how to apply Virtual Desktop to Enterprise network Security...
    Get full text
    Others
  3. 3
    by Chang-Tao Chung, 鍾昌浩
    Published 2010
    ... offers a lot of different service in Vehicular Ad hoc Network. When the information is passed in process...
    Get full text
    Others
  4. 4
    by Yu-hsin Lee, 李昱昕
    Published 2010
    ... networks are necessary. In this thesis, we will introduce the secure transmission mechanism for VANET...
    Get full text
    Others
  5. 5
    by Chuan-pi Wei, 魏川弼
    Published 2004
    ...碩士 === 國立中山大學 === 資訊管理學系研究所 === 92 === There seems to be more security events happening...
    Get full text
    Others
  6. 6
    by TENG-WEN CHIEH, 鄧文傑
    Published 2015
    ... convenient to obtain, in the case will also have to obtain convenient information security-related...
    Get full text
    Others
  7. 7
    by Zhen-Kai Hong, 洪振凱
    Published 2012
    ..., the accounts were hacked repeatedly despite the strict protection. The network enviorment and the game secured...
    Get full text
    Others
  8. 8
    by Po-ling Sun, 孫珀玲
    Published 2005
    ... to information and data security and integrity in the EPC Network are a growing and valid concern. Therefore...
    Get full text
    Others
  9. 9
    by Sheng-Tsung Lin, 林聖宗
    Published 2007
    ... speed,IP based,data packet switching network in GSM system. The paper integrates GPS, GSM/GPRS...
    Get full text
    Others
  10. 10
    by CHIEN-HAO HSU, 許乾豪
    Published 2003
    ... current securities focus on the single enterprise networking, some enterprises use the architecture...
    Get full text
    Others
  11. 11
    by Wei-chi Chang, 張維騏
    Published 2006
    ... is the most popular network application software now. But there are few security devices provide forensic...
    Get full text
    Others
  12. 12
    by Yu-ming Hu, 胡育銘
    Published 2002
    ... by multiple access.However,the distributed system introduces a security problem "How to manage test bank...
    Get full text
    Others
  13. 13
    by Tai-hsin Chang, 張代興
    Published 2012
    ..., but it connects to the bank host through wireless telecommunications network and internet, resulting in derivative...
    Get full text
    Others
  14. 14
    by Chien-Min Chen, 陳建民
    Published 2007
    ... worldwide at this moment. The ubiquitous environment consists of a wide range of network based appliances...
    Get full text
    Others
  15. 15
    by Hui-hao Gong, 龔暉皓
    Published 2010
    ... data security we will adopt a security mechanism to ensure user profile will not be improper...
    Get full text
    Others
  16. 16
    by Chia-Lin Kao, 高嘉璘
    Published 2005
    ... in some particular places far away, right at home with ease. However, a lot of security and privacy issues...
    Get full text
    Others
  17. 17
    by Yu-Hsuan Hsieh, 謝玉萱
    Published 2003
    ... to protect their legitimate intellectual assets which in turn are crucial to securing their long-term...
    Get full text
    Others
  18. 18
    by Jyun-Liang Ke, 柯俊良
    Published 2006
    ... design to IEEE 802.11 network environments in practice. Accordingly the security level as per IEEE 802.11...
    Get full text
    Others
  19. 19
    by Shu-mei Lo, 羅淑美
    Published 2010
    ... testing procedures becomes an issue to network vendors. To ensure the product quality during development...
    Get full text
    Others
  20. 20
    by Wan-ling Lai, 賴菀玲
    Published 2012
    ... technology and provides remote clients with services via internet and network technologies. It is further...
    Get full text
    Others