Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
431 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
432 |
Compilation for intrusion detection systems /Lydon, Andrew. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Includes bibliographical references (p. 115-122).
|
433 |
Xor based optical encryption with noise performance modeling and application to image transmission over wireless IP lan /Zhang, Bo. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004. / Word processed copy. Summary in English. Includes bibliographical references (leaves 117-120). Also available online.
|
434 |
Windows XP Operating System security analysis /Goktepe, Meftun. January 2002 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
|
435 |
Cube attacks on cryptographic hash functions /Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
|
436 |
Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /Young, Randall Frederick. Windsor, John C., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, August, 2008. / Title from title page display. Includes bibliographical references.
|
437 |
Flexible authorizations in workflow management systemsLui, W. C. January 2002 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2003. / Includes bibliographical references (leaves 162-168) Also available in print.
|
438 |
Data privacy the non-interactive setting /Narayanan, Arvind, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2009. / Title from PDF title page (University of Texas Digital Repository, viewed on Sept. 17, 2009). Vita. Includes bibliographical references.
|
439 |
Methodologies for power analysis attacks on hardware implementations of AES /Smith, Kenneth James. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 96-97).
|
440 |
Robust and efficient intrusion detection systems /Gupta, Kapil Kumar. January 2009 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Computer Science and Software Engineering, 2009. / Typescript. Includes bibliographical references (p. 131-146)
|
Page generated in 0.051 seconds