Academic literature on the topic 'Computer networks – Security measures – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Security measures – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks – Security measures – Zimbabwe"
NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Full textMtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textNwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textDissertations / Theses on the topic "Computer networks – Security measures – Zimbabwe"
Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Full textLU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Full textDong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Full textDavis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Full textKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Full textTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textMayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Full textBooks on the topic "Computer networks – Security measures – Zimbabwe"
Melissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.
Find full textAmine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.
Find full textJ, Stang David. Network security. 6th ed. International Computer Security Association, 1992.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textBook chapters on the topic "Computer networks – Security measures – Zimbabwe"
Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Full textWilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Full textStepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Full textGanga, Bhavani P., Tirapathamma S. Lakshmi, SK Reshma, B. Swetha, and N. Himaja. "Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures." In Emerging Trends in Computer Science and Its Application. CRC Press, 2025. https://doi.org/10.1201/9781003606635-42.
Full textParwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Full textRohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Full textWallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.
Full textHanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.
Full textAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Full textAikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.
Full textConference papers on the topic "Computer networks – Security measures – Zimbabwe"
Abdullah, Mahfuzul Huda, Mohammed Ayad Alkhafaji, Raaid Alubady, Ghassan Ahmed Ali, and Rajan Verma. "Access Controls and Privacy Measures for Electronic Health Records: Security Perspective." In 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2024. https://doi.org/10.1109/etncc63262.2024.10767555.
Full textGhorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.
Full textFang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Full textNikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.
Full textLuna, Ariel, Yair Levy, Gregory Simco, and Wei Li. "Towards Assessing Organizational Cybersecurity Risks via Remote Workers’ Cyberslacking and Their Computer Security Posture." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.5.
Full textCojocariu, Alin ciprian, Ion Verzea, and Rachid Chaib. "THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-062.
Full textR. Majeed, Mohammed, and Israa T. Ali. "Review: An Enhancement for Wireless Body Area Network Using Adaptive Algorithms." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1372.
Full textkhalid Ibrahim, Rasha. "Article review: Various Efficient Multifactor Methods for User Authentication." In III. International Rimar Congress of Pure, Applied Sciences. Rimar Academy, 2024. https://doi.org/10.47832/rimarcongress03-2.
Full textMurray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.
Full text