Spelling suggestions: "subject:"computer networks computer security."" "subject:"computer networks aomputer security.""
21 |
Network security services for flows and multicasts /Wong, Chung Kei, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 129-135). Available also in a digital version from Dissertation Abstracts.
|
22 |
CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network /LaMore, Robert L. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Cynthia Irvine, Paul Clark. Includes bibliographical references (p. 189-190). Also available online.
|
23 |
A CyberCIEGE scenario illustrating multilevel secrecy issues in an air operations center environment /Meyer, Marc K. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Cynthia Irvine, Paul C. Clark. Includes bibliographical references (p. 167-168). Also available online.
|
24 |
Secure distributed single sign-on with two-factor authentication /Brasee, Kaleb. January 2007 (has links)
Thesis (M.S.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
|
25 |
An approach to graph-based modeling of network exploitationsLi, Wei, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
26 |
Exploring extensions of traditional honeypot systems and testing the impact on attack profilingMcGrew, Robert Wesley, January 2005 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
27 |
Secure overlay multicast /Yiu, Wai-Pun. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
|
28 |
Process forensics the crossroads of checkpointing and intrusion detection /Foster, Mark S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 97 pages. Includes vita. Includes bibliographical references.
|
29 |
Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /Young, Randall Frederick. Windsor, John C., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, August, 2008. / Title from title page display. Includes bibliographical references.
|
30 |
Securing the IT acquisition secruity chain : security concerns and human factors in IT acquisition /Goldman, Eric. January 2010 (has links)
Typescript. Includes bibliographical references.
|
Page generated in 0.0816 seconds