Добірка наукової літератури з теми "Computer security – Technological innovations"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Computer security – Technological innovations".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Computer security – Technological innovations"
Helander, Martin G., and Kow Yong Ming. "Identifying the Needs of Elderly for Technological Innovations in the Smart Home." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 2 (September 2005): 158–62. http://dx.doi.org/10.1177/154193120504900202.
Повний текст джерелаNiu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.
Повний текст джерелаAbasova, Samira. "Analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations: Azerbaijan's experience." Technology audit and production reserves 5, no. 4(67) (November 30, 2022): 29–36. http://dx.doi.org/10.15587/2706-5448.2022.268042.
Повний текст джерелаRatten, Vanessa. "The effect of cybercrime on open innovation policies in technology firms." Information Technology & People 32, no. 5 (October 7, 2019): 1301–17. http://dx.doi.org/10.1108/itp-03-2018-0119.
Повний текст джерелаZhang, Zhenyu, and Zhuanzhuan Ge. "Protection and Restriction of Grain-Related Intellectual Property Rights in the Context of Food Security Based on Industrial Internet of Things." Mobile Information Systems 2022 (June 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4554447.
Повний текст джерелаZhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 1, no. 2 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.1.2.393.
Повний текст джерелаZhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 2, no. 1 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.2.1.393.
Повний текст джерелаChen, Minfeng. "Optimal Management of Computer Network Security in the Era of Big Data." Journal of Computer Networks and Communications 2022 (October 5, 2022): 1–10. http://dx.doi.org/10.1155/2022/9049420.
Повний текст джерелаVINOKUROV, ILYA. "DIGITAL ECONOMY IN THE RUSSIAN FEDERATION. PROBLEMS AND PROSPECTS FOR DEVELOPMENT." Public Administration 23, no. 5 (2021): 60–66. http://dx.doi.org/10.22394/2070-8378-2021-23-5-60-66.
Повний текст джерелаIlyash, Olha, Liubov Smoliar, Ruslan Lupak, Nataliia Duliaba, Iryna Dzhadan, Maryana Kohut, and Denys Radov. "Multidimensional analysis and forecasting the relationship between indicators of industrial-technological development and the level of economic security." Eastern-European Journal of Enterprise Technologies 5, no. 13 (113) (October 31, 2021): 14–25. http://dx.doi.org/10.15587/1729-4061.2021.243262.
Повний текст джерелаДисертації з теми "Computer security – Technological innovations"
Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Повний текст джерелаCollins, Michael. "Randomised shuffle and applied misinformation: An enhanced model for contact-based smart-card serial data transfer." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1997. https://ro.ecu.edu.au/theses/877.
Повний текст джерелаWillett, Melanie. "A framework for assuring conformance of cloud-based email at higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1018664.
Повний текст джерелаOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Повний текст джерелаStocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.
Повний текст джерелаHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Повний текст джерелаFuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.
Повний текст джерелаThesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
Ratliff, John M. "The persistence of national regimes of innovation in a globalizing economy : Japanese developmentalism in the information and telecommunications industries, 1985-1997 /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 1998. http://wwwlib.umi.com/cr/ucsd/fullcit?p9837848.
Повний текст джерелаLi, Chuen-Yueh. "Global sourcing in innovation." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1619148901&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Повний текст джерелаChristy, Sheila Ann Colley. "Future developments of computer network technologies in K-12 educational environments /." free to MU campus, to others for purchase, 1997. http://wwwlib.umi.com/cr/mo/fullcit?p9842520.
Повний текст джерелаКниги з теми "Computer security – Technological innovations"
The future X network: A Bell Labs perspective. Boca Raton, FL: CRC Press, 2015.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 2037, S. 2182, homeland security and the technology sector: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, April 24, 2002. Washington: U.S. G.P.O., 2004.
Знайти повний текст джерела(Belarus), Rėspublikanskai︠a︡ navukova-tėkhnichnai︠a︡ biblii︠a︡tėka. Informat︠s︡ionnoe obespechenie strategii innovat︠s︡ionnogo razvitii︠a︡ nauki i proizvodstva: Materialy nauchno-prakticheskoĭ konferent︠s︡ii, 12-13 okti︠a︡bri︠a︡ 2010 g. Minsk: Respublikanskai︠a︡ nauchno-tekhnicheskai︠a︡ biblioteka, 2010.
Знайти повний текст джерелаSchneier on security. Indianapolis, IN: Wiley Pub., 2008.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Research and Technology, ed. Can technology protect Americans from international cybercriminals?: Joint hearing before the Subcommittee on Oversight & Subcommittee Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, March 6, 2014. Washington: U.S. Government Printing Office, 2014.
Знайти повний текст джерелаWars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press, 2011.
Знайти повний текст джерелаCheng shi xin xi hua feng xian guan li yan jiu. Beijing Shi: Jing ji ke xue chu ban she, 2011.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Science. Subcommittee on Technology. Do you know who you are doing business with?: Signatures in a digital age : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, October 28, 1997. Washington: U.S. G.P.O., 1998.
Знайти повний текст джерела1947-, Luker Mark A., Petersen Rodney J, and EDUCAUSE (Association), eds. Computer and network security in higher education. San Francisco: Jossey-Bass, 2003.
Знайти повний текст джерелаThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Знайти повний текст джерелаЧастини книг з теми "Computer security – Technological innovations"
Gupta, Rakesh Kumar. "Technological Innovations and Emerging Issues in Beekeeping." In Beekeeping for Poverty Alleviation and Livelihood Security, 507–54. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9199-1_19.
Повний текст джерелаSinchana, M. K., and R. M. Savithramma. "Survey on Cloud Computing Security." In Innovations in Computer Science and Engineering, 1–6. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_1.
Повний текст джерелаGhelani, Dharmesh, Vikas Maral, and D. C. Mehetre. "Efficient Network Security Virtualization Scheme." In Innovations in Computer Science and Engineering, 51–58. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_6.
Повний текст джерелаVaseashta, Ashok. "Technological Innovations to Counter CBRNE Threat Vectors and Ecotage." In NATO Science for Peace and Security Series A: Chemistry and Biology, 3–23. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2488-4_1.
Повний текст джерелаPangaribowo, Evita, and Nicolas Gerber. "Innovations for Food and Nutrition Security: Impacts and Trends." In Technological and Institutional Innovations for Marginalized Smallholders in Agricultural Development, 41–64. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25718-1_3.
Повний текст джерелаSingh, Paramveer, and Monika Sharma. "Smart Device Challenges and Security Channels." In Innovations in Computer Science and Engineering, 33–40. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_5.
Повний текст джерелаHavisha, V., P. V. Padmavathi, and S. V. Ramanamurthy. "Cloud Security-Random Attribute Based Encryption." In Innovations in Computer Science and Engineering, 113–20. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_13.
Повний текст джерелаBegum, Gousiya, S. Zahoor Ul Huq, and A. P. Siva Kumar. "Security Features in Hadoop—A Survey." In Innovations in Computer Science and Engineering, 269–76. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4543-0_29.
Повний текст джерелаLikhar, Praveen, and Ravi Shankar Yadav. "Stealth Firewall: Invisible Wall for Network Security." In Innovations in Computer Science and Engineering, 413–21. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_46.
Повний текст джерелаGarg, Kanika, and Jaiteg Singh. "A Proposed Technique for Cloud Computing Security." In Innovations in Computer Science and Engineering, 89–95. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_10.
Повний текст джерелаТези доповідей конференцій з теми "Computer security – Technological innovations"
Manzar, Osama, and Saurabh Srivastava. "Presenting START, GOAL, Digital Sarthak, SkillBot and Maker’s Space: Inspiring Innovations for an Empowering, Democratic and Inclusive Technological Society." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.9404.
Повний текст джерелаGulshan and Sansar Singh Chauhan. "A Survey on Cyber Security Threats." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673184.
Повний текст джерелаSingh, Gurinder, Ruchika Gupta, and Vidushi Vatsa. "A Framework for Enhancing Cyber Security in Fintech Applications in India." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673277.
Повний текст джерелаManocha, Prabhjot Singh, and Rajiv Kumar. "A Review Paper: Improving Spider Monkey Optimization Algorithm SDN Routing for IOT Security." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673195.
Повний текст джерелаTewari, Naveen, and Gopal Datt. "A Study On The Systematic Review Of Security Vulnerabilities Of Popular Web Browsers." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673463.
Повний текст джерелаKukharenko, Elena G., and Vladimir A. Mankov. "Digitalization of the Company's Business Processes Based on Technological Innovations." In 2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2022. http://dx.doi.org/10.1109/itqmis56172.2022.9976792.
Повний текст джерелаAnvekar, Raj G., and Rajeshwari M. Banakar. "IoT application development: Home security system." In 2017 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR). IEEE, 2017. http://dx.doi.org/10.1109/tiar.2017.8273688.
Повний текст джерелаTewari, Naveen, and Gopal Datt. "A Systematic Review of Security Issues and challenges with Futuristic Wearable Internet of Things (IoTs)." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673353.
Повний текст джерелаFaizel, Fariya, and N. Vishwanath. "Noval Hybrid System Compressor Based Watermarking Scheme for Security of Multimedia Data." In 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR). IEEE, 2018. http://dx.doi.org/10.1109/icetietr.2018.8529094.
Повний текст джерелаKaur, Loveneet, and Ekta Rani. "Cloud computing’s emergence and associated security challenges." In INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108906.
Повний текст джерелаЗвіти організацій з теми "Computer security – Technological innovations"
Bauder, T. A. Proposal to improve math, science and computer science education at Woodrow Wilson Senior High School through the implementation of technological innovations. Office of Scientific and Technical Information (OSTI), December 1994. http://dx.doi.org/10.2172/510608.
Повний текст джерелаData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Повний текст джерелаPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Повний текст джерела