Works about COMPUTER network security


Results: 5000
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14

    Trust Enabled Secure Routing in Vehicular Adhoc Networks.

    Published in:
    International Arab Journal of Information Technology (IAJIT), 2025, v. 22, n. 3, p. 592, doi. 10.34028/iajit/22/3/13
    By:
    • Krishna Reddy, M. Venkata;
    • Kumar, G. Kiran;
    • Terlapu, Panduranga Vital;
    • Jayaram, D.;
    • Samreen, Shirina
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41

    Secure SOAP-based web services.

    Published in:
    Computer Systems Science & Engineering, 2003, v. 18, n. 1, p. 27
    By:
    • Komathy, K.;
    • Vivekanandan, P.;
    • Ramachandran, V.
    Publication type:
    Article
    42
    43
    44

    CYBER RESPONDS.

    Published in:
    Government Technology, 2013, v. 26, n. 5, p. 28
    By:
    • RATHS, DAVID
    Publication type:
    Article
    45

    Keeping the Lights On.

    Published in:
    Government Technology, 2011, v. 24, n. 1, p. 44
    By:
    • WEATHERFORD, MARK
    Publication type:
    Article
    46

    Keeping Up the Fight.

    Published in:
    Government Technology, 2009, v. 22, n. 12, p. 36
    By:
    • COLLINS, HILTON
    Publication type:
    Article
    47

    spectrum.

    Published in:
    Government Technology, 2008, v. 21, n. 7, p. 54
    By:
    • Stewartson, Karen
    Publication type:
    Article
    48

    spectrum.

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 54
    Publication type:
    Article
    49

    Data Defense.

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 44
    By:
    • Powers, Vicki
    Publication type:
    Article
    50

    Awarelessness.

    Published in:
    2007
    By:
    • Taylor, Paul W.
    Publication type:
    Editorial