Search ResultsElectronic Resources 
by
Satapathy, Suresh Chandra. editor.
Format:
Excerpt:
Mining on Social Network Data -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc
by
Chaki, Rituparna. editor.
Format:
Excerpt:
of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control
by
Alsmadi, Izzat M. editor.
Format:
Excerpt:
, unwanted traffic detection and control based on trust management software defined networks, security in
by
Thames, Lane. editor.
Format:
Excerpt:
Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
by
Winkler, J. R. (Joachim R.)
ScienceDirect http://www.sciencedirect.com/science/book/9781597495929
Format:
Excerpt:
fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know
by
Contos, Brian T.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491228
Format:
Excerpt:
. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video
by
Dubrawsky, Ido.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492317
Format:
Excerpt:
parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active
by
Piccard, Paul L.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490177
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
Format:
Excerpt:
IM and P2P applications under their control. Many businesses are now taking advantage of the speed
by
Zeng, Wenjun, 1967-
ScienceDirect http://www.sciencedirect.com/science/book/9780123694768
Format:
Excerpt:
technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media
by
Ben-Natan, Ron.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583347
Format:
Excerpt:
Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9
by
Rogers, Russ.
ScienceDirect https://www.sciencedirect.com/science/book/9781928994985
Format:
Excerpt:
-- Heightened motivation -- Chasing ghosts -- Taking back control -- Vengeance for deceit -- Elmininating false
by
Cox, I. J. (Ingemar J.)
ScienceDirect http://www.sciencedirect.com/science/book/9781558607149
Format:
Excerpt:
applications, including broadcast monitoring, transaction tracking, authentication, copy control, and device

Select an Action





