Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
251 |
Firewall resistance to metaferography in network communications /Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
|
252 |
Ensuring a C2 level of trust and interoperability in a networked Windows NT environmentLucas, Julie A. January 1996 (has links) (PDF)
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1996. / Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
|
253 |
Preserving privacy with user-controlled sharing of verified informationBauer, David Allen. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
254 |
Security analysis of session initiation protocolDobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
|
255 |
Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
|
256 |
Security through network-wide diversity assignment /O'Donnell, Adam J. Sethu, Harish. January 2005 (has links)
Thesis (Ph. D.)--Drexel University, 2005. / Includes abstract and vita. Includes bibliographical references (leaves 91-98).
|
257 |
Evaluation of two host-based intrusion prevention systems /Labbe, Keith G. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Neil Rowe, J.D. Fulp. Includes bibliographical references (p. 53-54). Also available online.
|
258 |
Establishing Regis network security policyOrtwein, Michael T. January 2005 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2005. / Title from PDF title page (viewed on Dec. 28, 2005). Includes bibliographical references.
|
259 |
Improvements on multimedia security algorithms /Liu, Zheng. January 2005 (has links) (PDF)
Thesis (Ph.D.) - University of Queensland, 2005. / Includes bibliography.
|
260 |
Recommendations for secure initialization routines in operating systems /Dodge, Catherine A. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
|
Page generated in 0.0525 seconds