Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Computer networks – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Computer networks – Security measures – Zimbabwe"
NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Der volle Inhalt der QuelleMtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Der volle Inhalt der QuelleKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Der volle Inhalt der QuelleZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Der volle Inhalt der QuelleSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Der volle Inhalt der QuelleGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Der volle Inhalt der QuelleLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Der volle Inhalt der QuelleMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Der volle Inhalt der QuelleNwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.
Der volle Inhalt der QuelleCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Der volle Inhalt der QuelleDissertationen zum Thema "Computer networks – Security measures – Zimbabwe"
Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Der volle Inhalt der QuelleLU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Der volle Inhalt der QuelleDong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Der volle Inhalt der QuelleDavis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Der volle Inhalt der QuelleKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Der volle Inhalt der QuelleTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Der volle Inhalt der QuelleRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Der volle Inhalt der QuelleMayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Der volle Inhalt der QuelleSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Der volle Inhalt der QuelleReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Der volle Inhalt der QuelleBücher zum Thema "Computer networks – Security measures – Zimbabwe"
John, Mallery, ed. Hardening network security. McGraw-Hill/Osborne, 2005.
Den vollen Inhalt der Quelle findenTeumim, David J. Industrial network security. 2nd ed. ISA, 2010.
Den vollen Inhalt der Quelle findenMelissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.
Den vollen Inhalt der Quelle findenHorton, Mike. Network security portable reference. McGraw-Hill, 2003.
Den vollen Inhalt der Quelle findenR, Panko Raymond, ed. Corporate computer security. 3rd ed. Prentice Hall, 2013.
Den vollen Inhalt der Quelle findenAmine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.
Den vollen Inhalt der Quelle findenJ, Stang David. Network security. 6th ed. International Computer Security Association, 1992.
Den vollen Inhalt der Quelle findenVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Computer networks – Security measures – Zimbabwe"
Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Der volle Inhalt der QuelleWilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Der volle Inhalt der QuelleStepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Der volle Inhalt der QuelleGanga, Bhavani P., Tirapathamma S. Lakshmi, SK Reshma, B. Swetha, and N. Himaja. "Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures." In Emerging Trends in Computer Science and Its Application. CRC Press, 2025. https://doi.org/10.1201/9781003606635-42.
Der volle Inhalt der QuelleParwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Der volle Inhalt der QuelleRohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Der volle Inhalt der QuelleWallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.
Der volle Inhalt der QuelleHanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.
Der volle Inhalt der QuelleAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Der volle Inhalt der QuelleAikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Computer networks – Security measures – Zimbabwe"
Abdullah, Mahfuzul Huda, Mohammed Ayad Alkhafaji, Raaid Alubady, Ghassan Ahmed Ali, and Rajan Verma. "Access Controls and Privacy Measures for Electronic Health Records: Security Perspective." In 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2024. https://doi.org/10.1109/etncc63262.2024.10767555.
Der volle Inhalt der QuelleGhorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.
Der volle Inhalt der QuelleFang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Der volle Inhalt der QuelleNikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.
Der volle Inhalt der QuelleLuna, Ariel, Yair Levy, Gregory Simco, and Wei Li. "Towards Assessing Organizational Cybersecurity Risks via Remote Workers’ Cyberslacking and Their Computer Security Posture." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.5.
Der volle Inhalt der QuelleCojocariu, Alin ciprian, Ion Verzea, and Rachid Chaib. "THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-062.
Der volle Inhalt der QuelleR. Majeed, Mohammed, and Israa T. Ali. "Review: An Enhancement for Wireless Body Area Network Using Adaptive Algorithms." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1372.
Der volle Inhalt der Quellekhalid Ibrahim, Rasha. "Article review: Various Efficient Multifactor Methods for User Authentication." In III. International Rimar Congress of Pure, Applied Sciences. Rimar Academy, 2024. https://doi.org/10.47832/rimarcongress03-2.
Der volle Inhalt der QuelleMurray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.
Der volle Inhalt der Quelle