Search

Your search keyword '"ACCESS control of computer networks"' showing total 221 results

Search Constraints

Start Over You searched for: Descriptor "ACCESS control of computer networks" Remove constraint Descriptor: "ACCESS control of computer networks" Publication Type Magazines Remove constraint Publication Type: Magazines
221 results on '"ACCESS control of computer networks"'

Search Results

1. The SCION Internet Architecture.

2. Internal Access Controls.

3. Prioritization key to prep for website accessibility rule.

4. New Approaches to Security and Availability for Cloud Data.

5. Cluster synchronization for a class of complex dynamical network system with randomly occurring coupling delays via an improved event-triggered pinning control approach.

6. OpenFlow: A Radical New Idea in Networking.

8. how SOFTWARE DEFINED NETWORKING SDN raised one district's IT response.

10. H∞ filtering for nonlinear networked systems with randomly occurring distributed delays, missing measurements and sensor saturation.

11. An improved event-triggered communication mechanism and [formula omitted] control co-design for network control systems.

12. Cross-layer resource allocation based on equivalent bandwidth in OFDMA systems.

13. Proper network segments may prevent the next breach.

14. Scenes from an Administrator in Transition: Navigating Organizational Barriers.

15. The eagle has landed – what happens next?

16. DEFINING THE FUTURE OF NETWORKING.

18. US net neutrality is finally dead.

19. NET NEUTRALITY IS TECHNO SOCIALISM.

20. Bright future with library clouds.

21. Linear estimation for networked control systems with random transmission delays and packet dropouts.

22. SDN Gets the Network Out of the Way.

23. WHY SOCIAL MEDIA IS NOT FREE.

24. TUNING THE WIRELESS.

25. Open to Attack?

26. THE POLITICAL POWER OF SOCIAL MEDIA.

27. Be Smart About IDs.

28. PROVISIONING 2.0.

29. THE NEW NORMS: Business Implications of the Revolution in Web Technologies.

30. A novel self-tuning feedback controller for active queue management supporting TCP flows

31. Join the Flock!

32. Managing Privileged Access to Servers.

33. Networks Get Smarter.

34. A function-based user authority delegation model

35. SIMs AND IAM UNITE.

36. Formatting and Parsing Time Intervals in the .NET Framework 4.

37. SAFE & SOUND.

38. COMPUTER NETWORKS.

39. A USB device is all it takes to steal credentials from locked PCs.

40. System performance analysis of situation awareness messaging using narrow-band multi-user detection

41. Remote working: managing the balancing act between network access and data security

42. High-Availability Considerations for Virtual Workloads.

43. Admission control in computer networks with uncertain parameters.

44. Data-centric security

45. Storage Area Networks Virtualize Disk.

46. Court Correctly Rejects Rights-Violating Net "Neutrality" Rules.

47. New European Standard on accessibility requirements for public procurement of ICT products and services.

48. WHERE TO FIND TOOL COMPONENT LISTS.

49. The Great Net Debate.

50. Towards ‘social’ security

Catalog

Books, media, physical & digital resources