Search results for Security   
Refine your search
Author
Purandare, Darshan (2)
Akkoyunlu, Seyma (1)
Alabrah, Amerah (1)
Allison, Pamela (1)
Amjad, Muhammad Faisa... (1)
Show more...

Release Date
2010-08-18 (5)
2013-05-15 (4)
2005-05-01 (3)
2006-05-10 (3)
2007-09-18 (3)
Show more...

Format
Pdf (42)

results 1-20 of 95 item(s)  page 1 of 5 : ( <<  1  2  3  4  5  >> ) :: previous : next
select all : clear all : add to favorites

 Image: Title: Subject: Description:

1. Testing the impact of training with simulated scenarios for information security awareness on virtual Testing the impact of training with simulated scenarios for information security awareness on virtual community of practice members

2. DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SEC

3. EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS

4. AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO

5. OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS

6. DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL AREA NETWORKS

7. Managing Effective Collaboration among Law Enforcement, Intelligence Services, and Military Forces in Managing Effective Collaboration among Law Enforcement, Intelligence Services, and Military Forces in Fight against Terrorism and Organized Crime

8. ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA

9. An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security Systems in Healthcare Organizations

10. Global secure sets of trees and grid-like graphs Global secure sets of trees and grid-like graphs

11. A Systems Approach to Sustainable Energy Portfolio Development A Systems Approach to Sustainable Energy Portfolio Development

12. Effects of IT Governance on Information Security Effects of IT Governance on Information Security

13. Networking and security solutions for VANET initial deployment stage Networking and security solutions for VANET initial deployment stage

14. ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

15. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY.

16. SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT

17. When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador (ONUSAL) and the UN Verification Mission in Guatemala (MINUGUA)

18. Optimization problem in single period markets Optimization problem in single period markets

19. Human Trafficking for Sexual Exploitation in Southeast Asia Human Trafficking for Sexual Exploitation in Southeast Asia

20. Principals' Perceptions and Self-efficacy in Relation to School Security Principals' Perceptions and Self-efficacy in Relation to School Security
select all : clear all : add to favorites

results 1-20 of 95 item(s)  page 1 of 5 : ( <<  1  2  3  4  5  >> ) :: previous : next
powered by CONTENTdm ® | contact us  ^ to top ^