Showing 1 - 19 results of 19 for search '"computer security"', query time: 0.06s Refine Results
  1. 1

    Computer Security Lab Manual /

    Published 2006
    Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
    View in OPAC
    Book
  2. 2

    Computer security lab manual /

    Subjects: “…Computer security Management Handbooks, manuals, etc. 10577…”
    Table of contents only
    Contributor biographical information
    View in OPAC
    Book
  3. 3

    Computer Security Lab Manual/ by Nestler,Vincent J, Conklin,Wm.Arthur, White,Gregory B., Hirsch,Matthew P.

    Published 2006
    Subjects: “…computer security 11095…”
    View in OPAC
    Book
  4. 4
  5. 5

    Principles of Information Security / by Whitman, Michael E., 1964-

    Published 2016
    Subjects:
    View in OPAC
    Book
  6. 6
  7. 7

    Cyber security and IT infrastructure protection /

    Published 2014
    Subjects: “…Computer security.…”
    View in OPAC
    Book
  8. 8
  9. 9
  10. 10

    Mobile Application Security / by Dwivedi, Himanshu

    Published 2010
    Subjects:
    View in OPAC
    Book
  11. 11
  12. 12

    The Study of Methods for Penetration Testing in Training of Information Security Specialists by A. M. Kadan, A. K. Doronin

    Published 2016-12-01
    “…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
    Get full text
    Article
  13. 13

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  14. 14
  15. 15

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
    Get full text
    Other
  16. 16

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  17. 17

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…Applying these two techniques to Dilithium, we obtain an advanced signature scheme with better efficiency, and without any other losses except some pre-computations. Security reduction demonstrates that our scheme is also SUF-CMA in QROM. …”
    Get full text
    Article
  18. 18
  19. 19