-
1“... to public or home networks can become infected with malware. Once these users connect their computers...”
Get full text
Others -
2“... network together. This study is on base of the how to apply Virtual Desktop to Enterprise network Security...”
Get full text
Others -
3“... offers a lot of different service in Vehicular Ad hoc Network. When the information is passed in process...”
Get full text
Others -
4“... networks are necessary. In this thesis, we will introduce the secure transmission mechanism for VANET...”
Get full text
Others -
5“...碩士 === 國立中山大學 === 資訊管理學系研究所 === 92 === There seems to be more security events happening...”
Get full text
Others -
6“... convenient to obtain, in the case will also have to obtain convenient information security-related...”
Get full text
Others -
7“..., the accounts were hacked repeatedly despite the strict protection. The network enviorment and the game secured...”
Get full text
Others -
8“... to information and data security and integrity in the EPC Network are a growing and valid concern. Therefore...”
Get full text
Others -
9“... speed,IP based,data packet switching network in GSM system. The paper integrates GPS, GSM/GPRS...”
Get full text
Others -
10“... current securities focus on the single enterprise networking, some enterprises use the architecture...”
Get full text
Others -
11“... is the most popular network application software now. But there are few security devices provide forensic...”
Get full text
Others -
12“... by multiple access.However,the distributed system introduces a security problem "How to manage test bank...”
Get full text
Others -
13“..., but it connects to the bank host through wireless telecommunications network and internet, resulting in derivative...”
Get full text
Others -
14“... worldwide at this moment. The ubiquitous environment consists of a wide range of network based appliances...”
Get full text
Others -
15“... data security we will adopt a security mechanism to ensure user profile will not be improper...”
Get full text
Others -
16“... in some particular places far away, right at home with ease. However, a lot of security and privacy issues...”
Get full text
Others -
17“... to protect their legitimate intellectual assets which in turn are crucial to securing their long-term...”
Get full text
Others -
18“... design to IEEE 802.11 network environments in practice. Accordingly the security level as per IEEE 802.11...”
Get full text
Others -
19“... testing procedures becomes an issue to network vendors. To ensure the product quality during development...”
Get full text
Others -
20“... technology and provides remote clients with services via internet and network technologies. It is further...”
Get full text
Others