Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
71 |
Elliptic curve cryptosystem over optimal extension fields for computationally constrained devicesAbu Mahfouz, Adnan Mohammed I. January 2004 (has links)
Thesis (M.Sc.)(Computer Science)--University of Pretoria, 2004. / Summaries in English and Afrikaans. Includes bibliographical references.
|
72 |
Role-based access control for coalition partners in maritime domain awareness /McDaniel, Christopher R. Tardy, Matthew L. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): James B. Michael, Alan A. Ross. Includes bibliographical references (p. 81-83). Also available online.
|
73 |
Computer forensics methodology and praxisMorrison, Robin Cincinnatis, January 2006 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2006. / Title and description from thesis home page (viewed Jan. 30, 2007). Department of Computer Engineering and Computer Science. Vita. "August 2006." Includes bibliographical references (p. 79-82).
|
74 |
Learning from perturbed data for privacy-preserving data miningMa, Jianjie, January 2006 (has links) (PDF)
Thesis (Ph. D.)--Washington State University, August 2006. / Includes bibliographical references (p. 132-138).
|
75 |
The SOX compliant SAP security implementationCandelaria, Michael E. January 2006 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2006. / Title from PDF title page (viewed on May 25, 2006). Includes bibliographical references.
|
76 |
A theory for the design and analysis of firewallsLiu, Xiang-Yang Alexander, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
|
77 |
Polar proxies collaborating to achieve anonymous web browsing /Tillwick, Heiko Mark. January 2007 (has links)
Thesis (M.Sc.)(Computer Science)--University of Pretoria, 2007. / Includes summary. Includes bibliographical references. Available on the Internet via the World Wide Web.
|
78 |
Widespread Internet attacks defense-oriented evolution and countermeasures /Wang, Xun, January 2007 (has links)
Thesis (Ph. D.)--Ohio State University, 2007. / Title from first page of PDF file. Includes bibliographical references (p. 151-162).
|
79 |
Deploying a secure Windows operating system and applicationsMiles, Russell Slater, January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
|
80 |
An architectural approach to achieving higher-level security for component (service) based software systemsVorobiev, Artem. January 2008 (has links)
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008. / Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
|
Page generated in 0.0741 seconds