Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
1
Computer Networks : principles, technologies, and protocols for network design /
Published 2006Subjects: “…Computer networks Textbooks. 3870…”
Table of contents only
Publisher description
View in OPAC
Book -
2
-
3
Juveniles as victims of criminal acts committed under the misuse of computer network
Published 2018-01-01“…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
Get full text
Article -
4
Understanding the network : a practical guide to internetworking /
Published 2000Subjects: “…Computer networks. 10789…”
View in OPAC
Book -
5
Data Communications and Networks /
Published 2006Subjects: Publisher description
Table of contents only
View in OPAC
Book -
6
The Internet Book : everything you need to know about computer networking and how the Internet works /
Published 2019Subjects: View in OPAC
Book -
7
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
8
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
9
-
10
The practice of cloud system administration : designing and operating large distributed systems /
Published 2015Subjects: “…Computer networks Management. 14156…”
View in OPAC
Book -
11
-
12
Privacy in the Internet: Myth or reality
Published 2016-01-01“…What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.…”
Get full text
Article -
13
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
14
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
15
-
16
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
Get full text
Article -
17
Analisis Pengembangan Jaringan Komputer UIN Sunan Kalijaga Yogyakarta Menggunakan Perbandingan Protokol Routing Statik dan Routing Dinamis OSPF
Published 2021-03-01“…Abstract This study describes the comparison of routing as one of computer network management. The purpose of this study is to analyze static routing protocols with OSPF dynamic routing on computer networks in the State Islamic University of Sunan Kalijaga Yogyakarta with literature study methods and interviews in data collection. …”
Get full text
Article -
18
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
Get full text
Thesis -
19
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01Get full text
Article -
20
Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python
Published 2022-02-01“…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
Get full text
Article