Search Results - "Computer networks - Security measures"
Search alternatives:
- "Computer networks - Security measures" »
-
1
-
2
Protecting network with Cisco solution
Published 2008Subjects: “…Computer network - Security measure…”
Get full text
Article -
3
Development of local area network secure backup application
Published 2008Subjects: Get full text
Learning Object -
4
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024Subjects: “…Computer networks -- Security measures -- Planning…”
thesis::doctoral thesis -
5
Network Security: an Introduction to Techniques and Standard
Published 2022Subjects: “…Computer networks--Security measures…”
Book -
6
Improving the security model of software define networks
Published 2023Subjects:text::Final Year Project -
7
Network security situation awareness based on indicators extracted
Published 2016Subjects: “…Computer networks - Security measures…”
Get full text
Get full text
Thesis -
8
Analysis the performance of adaptive demodulator in terms of bit error rate for software defined radio
Published 2009Subjects: Get full text
Conference or Workshop Item -
9
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
Published 2008Subjects: Get full text
Get full text
Article -
10
DDOS avoidance strategy for service avalibilty
Published 2015Subjects: Get full text
Get full text
Thesis -
11
Risk awareness model for security and privacy in social networking sites from the users’ perspective
Published 2021Subjects: “…Computer networks - Security measures…”
Get full text
Get full text
Thesis -
12
Electronic Book of Network Security: Introduction to Network Security
Published 2003Subjects: Get full text
Get full text
Get full text
Project Paper Report -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016Subjects: Get full text
Get full text
Thesis -
14
A design for building and implementation of Network based intrusion detection and prevention system (NIDPS) using open source products
Published 2008Subjects: Get full text
Learning Object -
15
Windows 10 instant messaging application forensics
Published 2018Subjects: Get full text
Get full text
Thesis -
16
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
Published 2015Subjects: Get full text
Get full text
Thesis -
17
Steganography in webpages using CSS color attributes enhanced by rule-based system
Published 2016Subjects: Get full text
Get full text
Thesis -
18
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004Subjects: Get full text
Get full text
Thesis -
19
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
Published 2015Subjects: Get full text
Get full text
Thesis -
20
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003Subjects: Get full text
Get full text
Thesis
