• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1963
  • 183
  • 182
  • 147
  • 36
  • 25
  • 25
  • 25
  • 25
  • 25
  • 24
  • 16
  • 11
  • 9
  • 7
  • Tagged with
  • 2877
  • 2877
  • 750
  • 637
  • 506
  • 499
  • 393
  • 336
  • 314
  • 300
  • 299
  • 289
  • 288
  • 277
  • 276
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

A computer communications system

Janne, Kim W January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
332

Rule hashing for efficient packet classification in network intrusion detection

Yoshioka, Atsushi, January 2007 (has links) (PDF)
Thesis (M.S. in computer science)--Washington State University, December 2007. / Includes bibliographical references (p. 44-45).
333

Annual report for the projects: Data Network Reliability. / Data network reliability

21 June 2002 (has links)
Cover title, 1975/76- : Data network reliability; annual report. Principal investigator, 1975/76- : J.M. Wozencraft. Report year ends June 30. Vols. for 1975/76- report on research supported by Information Processing Technology Office, Defense Advanced Research Projects Agency, U.S. Dept. of Defense, ARPA order no. 3045.5-7-75, program code no. 5T10, ONR/N00014-75-C-1183, ONR contract no. 049-383.
334

Finite-state analysis of security protocols

Shmatikov, Vitaly. January 1900 (has links)
Thesis (Ph.D)--Stanford University, 2000. / Title from pdf t.p. (viewed Mar. 27, 2002). "May 2000." "Adminitrivia V1/Prg/20000602"--Metadata.
335

Enhancing Network Security in Linux Environment

Mohammed, Ali, Sama, Sachin, Mohammed, Majeed January 2012 (has links)
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation. After analysing the security measures for implementing network security, it is important to understand the role of network monitoring tools and Linux inbuilt log management in maintaining the security of a network. This is accomplished by presenting a detailed discussion on network monitoring tools and log management in Linux. In order to test the network security, a network is designed using Linux systems by configuring different servers and application firewall for packet filtering. The security measures configured on each server to enhance its security are presented as part of the implementation. The results obtained while an unauthorized user accessing the servers from the external network are also documented along with attack information retrieved by different network monitoring tools and Linux inbuilt log messages.
336

Load balancing in distributed object computing systems

Cheung, Lap-sun. January 2001 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2001. / Includes bibliographical references (leaves 99-101).
337

Energy-efficient wireless sensor network MAC protocol /

Brownfield, Michael I. January 2006 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 2006. / Vita. Includes bibliographical references (p.166-171). Online version available
338

A portable and improved implementation of the Diffie-Hellman protocol for wireless sensor networks /

Shoaib, Naveed. January 2009 (has links)
Thesis (M.S.)--Youngstown State University, 2009. / Includes bibliographical references (leaves 67-69). Also available via the World Wide Web in PDF format.
339

Development of a Civil Engineer Corps community portal prototype /

Rader, Neil Christopher. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Dale M. Courtney, Glenn R. Cook. Includes bibliographical references (p. 103). Also available online.
340

A pilot project for the development of guidelines towards the establishment of a telecentre in a rural community in South Africa

Van der Merwe, Daisy Margaret. January 2001 (has links)
Thesis (M.A. (Information Science))--University of Pretoria, 2001. / Summaries in Afrikaans and English.

Page generated in 0.1813 seconds