188 results on '"Gold, Steve"'
Search Results
2. Challenges ahead on the digital forensics and audit trails
3. Financial services sector puts voice biometrics at heart of fraud battle
4. The evolution of payment card fraud
5. In search of a new perimeter
6. Understanding the digital fingerprint
7. Meeting the biometrics payment security challenge
8. Healthcare biometrics: solving the staff and patient security governance challenge
9. Subverting cellular technology: evolution, not revolution
10. Getting lost on the Internet: the problem with anonymity
11. Black Hat Europe: mobile attack vectors in the spotlight
12. Iris biometrics: a legal invasion of privacy?
13. Electronic countersurveillance strategies
14. RapidDNA: a game changer in the law enforcement identification stakes
15. Virtual jihad: how real is the threat?
16. Enterprise biometric integration under the microscope
17. Cellular jamming
18. Border control biometrics and surveillance
19. Biometrics at the ATM – the need for customer authentication
20. Wireless cracking: there's an app for that
21. Securing VoIP
22. Biometrics fit to secure the London Olympics
23. Dis-Jointed? Several Approaches to Divisibility After Burlington Northern
24. The cookie monster
25. Understanding the hacker psyche
26. Cracking wireless networks
27. Android insecurity
28. Cracking cellular networks via femtocells
29. The rebirth of phreaking
30. Terrorism and Bluetooth
31. Taking down botnets
32. The future of the firewall
33. Cracking GSM
34. IPv6 migration and security
35. Advanced evasion techniques
36. Vital signs strong for healthcare biometrics
37. The privacy imperative
38. Biometrics – a global review
39. Break for the border
40. Winning acceptance among privacy-aware consumers
41. Understanding the drivers for secure data storage
42. Why WPA standards won't protect your network
43. Securing the National Health Service
44. Protecting the cloud: attack vectors and other exploits
45. Social engineering today: psychology, strategies and tricks
46. Password alternatives
47. Cracking passwords
48. Military biometrics on the frontline
49. Healthcare biometrics — defending patients and their data
50. Government biometrics: the ups and downs
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.