Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
441 |
Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /Snyder, Walter C. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 73-76).
|
442 |
Forward security from bilinear pairings signcryption and threshold signature /Chow, Sze-ming, Sherman. January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2005. / Title proper from title frame. Also available in printed format.
|
443 |
On the security and efficiency of encryptionCash, Charles David. January 2009 (has links)
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010. / Committee Chair: Boldreva, Alexandra; Committee Member: Ahamad, Mustaque; Committee Member: Randall, Dana; Committee Member: Tetali, Prasad; Committee Member: Traynor, Patrick. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
444 |
Securing the IT acquisition secruity chain : security concerns and human factors in IT acquisition /Goldman, Eric. January 2010 (has links)
Typescript. Includes bibliographical references.
|
445 |
Computer crime and identity theftHunter, Harry A. January 2010 (has links)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2010. / Title from PDF title page (viewed on Jul. 14, 2010). Includes bibliographical references.
|
446 |
Public key infrastructure utilization to provide an added level of authenticity to transmitted dataBlackmon, Jason B. January 2010 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Buddenberg, Rex. Second Reader: Housel, Thomas. "March 2010." Description based on title screen as viewed on April 27, 2010. Author(s) subject terms: Public key infrastructure, user agent, authenticity, confidentiality, integrity. Includes bibliographical references (p. 47-48). Also available in print.
|
447 |
The interrelationships among online consumers level of awareness of spy software, personal values, innovativeness characteristics and concerns /Youn, Hyunsook. McClung, Steven. January 1900 (has links)
Thesis (M.A.)--Florida State University, 2005. / Advisor: Dr. Steven McClung, Florida State University, College of Communication, Dept. of Communication. Title and description from dissertation home page (viewed Sept. 29, 2005). Document formatted into pages; contains ix, 66 pages. Includes bibliographical references.
|
448 |
Advances in low-level software protection /Van Dyke, Colin William. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2006. / Printout. Includes bibliographical references (leaves 102-106). Also available on the World Wide Web.
|
449 |
EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examinationEads, Joshua Michael, January 2010 (has links) (PDF)
Thesis (M.S.)--Missouri University of Science and Technology, 2010. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed May 4, 2010) Includes bibliographical references (p. 65-68).
|
450 |
Challenging policies that do not play fair : a credential relevancy framework using trust negotiation ontologies /Leithead, Travis S., January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2005. / Includes bibliographical references (p. 77-83).
|
Page generated in 0.0517 seconds