Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
67 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      Mining on Social Network Data -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc
      by 
      Chaki, Rituparna. editor.
      Format: 
      Excerpt: 
      of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control
      by 
      Alsmadi, Izzat M. editor.
      Format: 
      Excerpt: 
      , unwanted traffic detection and control based on trust management software defined networks, security in
      by 
      Thames, Lane. editor.
      Format: 
      Excerpt: 
      Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
      by 
      Winkler, J. R. (Joachim R.)
      Format: 
      Excerpt: 
      fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know
      by 
      Contos, Brian T.
      Format: 
      Excerpt: 
      . Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video
      by 
      Dubrawsky, Ido.
      Format: 
      Excerpt: 
      parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active
      by 
      Piccard, Paul L.
      Format: 
      Excerpt: 
      IM and P2P applications under their control. Many businesses are now taking advantage of the speed
      by 
      Zeng, Wenjun, 1967-
      Format: 
      Excerpt: 
      technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media
      by 
      Ben-Natan, Ron.
      Format: 
      Excerpt: 
      Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9
      by 
      Rogers, Russ.
      Format: 
      Excerpt: 
      -- Heightened motivation -- Chasing ghosts -- Taking back control -- Vengeance for deceit -- Elmininating false
      by 
      Cox, I. J. (Ingemar J.)
      Format: 
      Excerpt: 
      applications, including broadcast monitoring, transaction tracking, authentication, copy control, and device