Search results for Security   
Refine your search
Format
Pdf (35)

Release Date
2010-08-18 (5)
2013-05-15 (4)
2006-05-10 (3)
2007-09-18 (3)
2008-06-03 (3)
Show more...

Author
Purandare, Darshan (2)
Aslam, Baber (1)
Aved, Alexander (1)
Balakrishnan, Mohanak... (1)
Bandel, Peter (1)
Show more...

results 1-20 of 88 item(s)  page 1 of 5 : ( <<  1  2  3  4  5  >> ) :: previous : next
select all : clear all : add to favorites

 Image: Title: Subject: Description:

1. Testing the impact of training with simulated scenarios for information security awareness on virtual Testing the impact of training with simulated scenarios for information security awareness on virtual community of practice members

2. DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SEC

3. EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS

4. AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO

5. OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS

6. DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL AREA NETWORKS

7. ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA

8. An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security Systems in Healthcare Organizations

9. Global secure sets of trees and grid-like graphs Global secure sets of trees and grid-like graphs

10. A Systems Approach to Sustainable Energy Portfolio Development A Systems Approach to Sustainable Energy Portfolio Development

11. Effects of IT Governance on Information Security Effects of IT Governance on Information Security

12. Networking and security solutions for VANET initial deployment stage Networking and security solutions for VANET initial deployment stage

13. ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

14. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY. ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY.

15. SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT

16. When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador When do comprehensive peacekeeping operations succeed? The case of the UN Observer Mission in El Salvador (ONUSAL) and the UN Verification Mission in Guatemala (MINUGUA)

17. Optimization problem in single period markets Optimization problem in single period markets

18. Human Trafficking for Sexual Exploitation in Southeast Asia Human Trafficking for Sexual Exploitation in Southeast Asia

19. SECURITY DESIGN THAT ADDRESSES AGENCY CONFLICTS AND INFORMATION ASYMMETRY SECURITY DESIGN THAT ADDRESSES AGENCY CONFLICTS AND INFORMATION ASYMMETRY

20. REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY
select all : clear all : add to favorites

results 1-20 of 88 item(s)  page 1 of 5 : ( <<  1  2  3  4  5  >> ) :: previous : next
powered by CONTENTdm ® | contact us  ^ to top ^