Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Security measures 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
21
Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan
Published 2019-10-01Subjects: Get full text
Article -
22
Propuesta de diseño de una red LAN para el Hospital Pediátrico Universitario Borrás-Marfán
Published 2023-03-01Subjects: “…lan network, computer network, telecommunications, design.…”
Get full text
Article -
23
Authorisation inconsistency in IoT third‐party integration
Published 2022-03-01Subjects: Get full text
Article -
24
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
25
A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM
Published 2020-12-01Subjects: Get full text
Article -
26
Data Communications and Networks /
Published 2006Subjects: Publisher description
Table of contents only
View in OPAC
Book -
27
Applied network security monitoring : collection, detection, and analysis /
Published 2014Subjects: View in OPAC
Book -
28
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
29
Comparative analysis of VPN protocols
Published 2023-06-01Subjects: “…computer network; cloud computing; virtual private network…”
Get full text
Article -
30
Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices
Published 2025-04-01Subjects: Get full text
Article -
31
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs)
Published 2024-12-01Subjects: Get full text
Article -
32
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Published 2024-09-01Subjects: “…computer network security…”
Get full text
Article -
33
Preserving Local Wisdom through Subak Analogy Videos for Teaching Computer Network Concepts
Published 2025-03-01Subjects: Get full text
Article -
34
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network;peer to peer;evaluating model;Churn…”
Get full text
Article -
35
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network…”
Get full text
Article -
36
A fast user actual privilege reasoning framework based on privilege dependency graph reduction
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
37
Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices
Published 2025-04-01Subjects: Get full text
Article -
38
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
39
SIMULATION OF COMPUTER NETWORK LOAD PARAMETERS OVER A GIVEN PERIOD OF TIME
Published 2019-09-01Subjects: “…computer network…”
Get full text
Article -
40
Performance evaluation of AQM schemes: a comparative study
Published 2005-01-01Subjects: “…computer networks…”
Get full text
Article