Showing 41 - 60 results of 31,117 for search 'NETWORK SECURITY', query time: 1.35s Refine Results
  1. 41
    by Nunnally, Troy J.
    Published 2015
    Subjects: ...Network security...
    Get full text
    Others
  2. 42
    by Zhiping Cai, Chengchen Hu, Kai Zheng, Yang Xu, Qiang Fu
    Published 2018-01-01
    ...Security and Communication Networks...
    Get full text
    Article
  3. 43
    by Emil BURTESCU
    Published 2006-01-01
    ... are obvious. But the construction and the existence of a network without meeting some minimum security...
    Get full text
    Article
  4. 44
    ...Security and Communication Networks...
    Get full text
    Article
  5. 45
    by Jones, Francis B.
    Published 2014
    ...Human factors, such as ethics and education, are important factors in network information security...
    Get full text
  6. 46
    by Brown, Thomas L.
    Published 2014
    ... security tools, to support Unix networks. The toolbox can be used to enhance system security, automating...
    Get full text
  7. 47
    by Cheng, C. S.
    Published 2001
    ... from the network equipment offers greatest flexibility for the implementation of secure control...
    Get full text
  8. 48
    by Rui-Chung Bai, 白睿中
    Published 2011
    ...碩士 === 國立嘉義大學 === 資訊工程學系研究所 === 99 === IP security protocol (IPsec) has been implemented widely...
    Get full text
    Others
  9. 49
    by Fuloria, Shailendra
    Published 2012
    Subjects: ...Electric power systems--Security measures...
    Get full text
  10. 50
    by Moten, Daryl, Jambureskan, Sekaran
    Published 2014
    ... === This paper develops a Security Architecture for a network of telemetry networks as is envisioned for future...
    Get full text
  11. 51
    by Nikolov, Nikolay
    Published 2010
    Subjects: ...security technologies...
    Get full text
    Others
  12. 52
    by Chen, Tse-Min, 陳澤民
    Published 1997
    ... in the system. An Amoeba Network Security System (ANSS) is then built based on the design schemes...
    Get full text
    Others
  13. 53
    by Wu,YuTing, 吳育庭
    Published 2012
    ... and higher. However, the network itself has the shortage of security and is often attacked and intruded...
    Get full text
    Others
  14. 54
    by Pepakayala, Sagar
    Published 2007
    ... the blackhat community day by day, honeypots could be an effective weapon in the network security administrator...
    Get full text
    Others
  15. 55
    by Soewito, Benfano
    Published 2009
    ..., availability, and integrity for diverse system connected through them. If network security system could...
    Get full text
    Get full text
    Others
  16. 56
    ... (pages 43-44). === In this thesis, we study the security of a block cipher design called substitution...
    Get full text
    Others
  17. 57
    by EVALDO GONCALVES PELAES
    Published 1982
    .... Three security protocols are then proposed for interactive and one-way communication in packet...
    Get full text
    Get full text
  18. 58
    by Paul, Greig
    Published 2017
    ... encountered in implementing a secure decentralised network, based around storage, and presents solutions...
    Get full text
  19. 59
    by Chou-chuan Chen, 陳周全
    Published 2007
    ... that, network attacking is composite by multiple steps of attacks. The attacker should consider and combine...
    Get full text
    Others
  20. 60
    by Cai, Songlin
    Published 2005
    ...This dissertation studies several security issues in data networks, to reveal the vulnerability...
    Get full text