Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Computer networks – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Computer networks – Security measures – Zimbabwe"
Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid und Dieter Gollmann. „Towards Operational Measures of Computer Security“. Journal of Computer Security 2, Nr. 2-3 (01.04.1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Der volle Inhalt der QuelleKlevtsov, O., A. Symonov und S. Trubchaninov. „Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment“. Nuclear and Radiation Safety, Nr. 4(88) (11.12.2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Der volle Inhalt der QuelleCourtney, Robert H. „Security Measures are Inherently Undesirable“. EDPACS 13, Nr. 9 (März 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Der volle Inhalt der QuelleZhang, Wen Jie. „Network Security Vulnerabilities and Preventive Measures“. Applied Mechanics and Materials 433-435 (Oktober 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Der volle Inhalt der QuelleGuo, Wen Zhan. „Research on Computer Wireless Network and Information Security“. Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Der volle Inhalt der QuelleSmith, Martin. „Part 2 Personnel security measures within a computer installation“. Computer Law & Security Review 6, Nr. 2 (Juli 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Der volle Inhalt der QuelleAlfonsi, B. J. „Hacker study: aiding security measures development?“ IEEE Security & Privacy 1, Nr. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Der volle Inhalt der QuelleMtengwa, Bonnie Batsirai, Agripah Kandiero und Stanislas Bigirimana. „Drivers of Mobile Money Services Development in Zimbabwe“. International Journal of E-Business Research 17, Nr. 1 (Januar 2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Der volle Inhalt der QuelleZhang, Kai, Liang Zhao und Hai Qing Cao. „Research on the Computer Network Crime and Information Security“. Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Der volle Inhalt der QuelleKounavis, Michael, David Durham, Sergej Deutsch und Ken Grewal. „Security definitions, entropy measures and constructions for implicitly detecting data corruption“. Computer Communications 160 (Juli 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Der volle Inhalt der QuelleDissertationen zum Thema "Computer networks – Security measures – Zimbabwe"
Bailey, Carmen F. „Analysis of security solutions in large enterprises“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Der volle Inhalt der QuelleLU, WEN-PAI. „SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)“. Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Der volle Inhalt der QuelleDong, Ying, und 董穎. „Providing security services for mobile ad hoc networks“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Der volle Inhalt der QuelleKalutarage, H. K. „Effective monitoring of slow suspicious activites on computer networks“. Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Der volle Inhalt der QuelleDavis, Carlton R. „Security protocols for mobile ad hoc networks“. Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Der volle Inhalt der QuelleOne of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
Tyukala, Mkhululi. „Governing information security using organisational information security profiles“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Der volle Inhalt der QuelleRen, Kui. „Communication security in wireless sensor networks“. Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Der volle Inhalt der QuelleSanyamahwe, Tendai. „Digital forensic model for computer networks“. Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Der volle Inhalt der QuelleMayisela, Simphiwe Hector. „Data-centric security : towards a utopian model for protecting corporate data on mobile devices“. Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Der volle Inhalt der QuelleKing-Lacroix, Justin. „Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems“. Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Der volle Inhalt der QuelleBücher zum Thema "Computer networks – Security measures – Zimbabwe"
Computer security fundamentals. 2. Aufl. Indianapolis, Ind: Pearson IT Certification, 2012.
Den vollen Inhalt der Quelle findenPer, Christoffersson, Hrsg. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.
Den vollen Inhalt der Quelle findenPractical computer network security. Boston: Artech House, 1995.
Den vollen Inhalt der Quelle findenNetwork security architectures. Indianapolis, IN: Cisco Press, 2004.
Den vollen Inhalt der Quelle findenFundamentals of network security. New York: McGraw-Hill Technology Education, 2004.
Den vollen Inhalt der Quelle findenDonald, Stoddard, Hrsg. Network security first-step. 2. Aufl. Indianapolis, IN: Cisco Press, 2012.
Den vollen Inhalt der Quelle findenNetworking security and standards. Boston, Mass: Kluwer Academic, 1997.
Den vollen Inhalt der Quelle findenNetwork security first-step. Indianapolis, IN: Cisco Press, 2004.
Den vollen Inhalt der Quelle findenNetwork security auditing. Indianapolis, Ind: Cisco Press, 2010.
Den vollen Inhalt der Quelle findenMelissa, Zgola, und Bullaboy Dana, Hrsg. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Computer networks – Security measures – Zimbabwe"
Michael, Mark. „Physical Security Threats and Measures“. In Handbook of Computer Networks, 596–631. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Der volle Inhalt der QuelleWilbur, Steve R., Jon Crowcroft und Yuko Murayama. „MAC layer security measures in local area networks“. In Lecture Notes in Computer Science, 53–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Der volle Inhalt der QuelleStepień, Krzysztof, und Aneta Poniszewska-Marańda. „Towards the Security Measures of the Vehicular Ad-Hoc Networks“. In Lecture Notes in Computer Science, 233–48. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Der volle Inhalt der QuelleParwekar, Pritee, und Sparsh Arora. „Security Issues and Its Counter Measures in Mobile Ad Hoc Networks“. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 301–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Der volle Inhalt der QuelleRohilla, Shourya, und Rejo Mathew. „Comparison of Cloud Computing Security Threats and Their Counter Measures“. In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 224–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Der volle Inhalt der QuelleHanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, Mohammad Taghi Teimoori, Florian Kriebel, Jeff (Jun) Zhang, Kang Liu et al. „Robust Computing for Machine Learning-Based Systems“. In Dependable Embedded Systems, 479–503. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.
Der volle Inhalt der QuelleAdogbeji, Oghenevwogaga Benson. „Computer Security in Cybercafés“. In Security and Software for Cybercafes, 18–29. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Der volle Inhalt der QuelleAikins, Stephen K. „Practical Measures for Securing Government Networks“. In Handbook of Research on Public Information Technology, 386–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.
Der volle Inhalt der QuelleKurebwa, Jeffrey, und Jacqueline Rumbidzai Tanhara. „Cybercrime as a Threat to Zimbabwe's Peace and Security“. In Cyber Warfare and Terrorism, 1107–22. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch066.
Der volle Inhalt der QuelleKurebwa, Jeffrey, und Jacqueline Rumbidzai Tanhara. „Cybercrime as a Threat to Zimbabwe's Peace and Security“. In Global Cyber Security Labor Shortage and International Business Risk, 365–80. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5927-6.ch014.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Computer networks – Security measures – Zimbabwe"
Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi und Nouri Masmoudi. „The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm“. In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.
Der volle Inhalt der QuelleFang, Chaojun. „Study on security problems and preventive measures of computer network and foreign trade and business“. In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Der volle Inhalt der QuelleMurray, Mark. „Technology Dependence Beyond Control Systems“. In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.
Der volle Inhalt der Quelle