Information Security Technical Report

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Windows NT security architecture
Information Security Technical Report - Tập 3 - Trang 15-22 - 1998
John Hayday
Social networking as a nexus for engagement and exploitation of young people
Information Security Technical Report - Tập 16 - Trang 44-50 - 2011
Ethel Quayle, Max Taylor
Networks — Where does the real threat lie?
Information Security Technical Report - Tập 3 - Trang 65-74 - 1998
Roy McNamara
Connectivity models of interdependency in mixed-type critical infrastructure networks
Information Security Technical Report - Tập 12 Số 1 - Trang 44-55 - 2007
Introduction to Web services and their security
Information Security Technical Report - Tập 10 - Trang 2-14 - 2005
Konstantin Beznosov, Donald J. Flinn, Shirley Kawamoto, Bret Hartman
Toward web-based information security knowledge sharing
Information Security Technical Report - Tập 17 - Trang 199-209 - 2013
Daniel Feledi, Stefan Fenz, Lukas Lechner
Communication service providers: Forensic source and investigatory tool
Information Security Technical Report - Tập 11 - Trang 10-17 - 2006
Ian Walden
Catching the malicious insider
Information Security Technical Report - Tập 13 - Trang 220-224 - 2008
Andy Jones
Building secure business applications at Microsoft
Information Security Technical Report - Tập 13 - Trang 105-110 - 2008
John Steer, Ashish Popli
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud
Information Security Technical Report - Tập 16 - Trang 115-122 - 2011
Lizzie Coles-Kemp, Joseph Reddington, Patricia A.H. Williams
Tổng số: 172   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10