Search

Your search keyword '"Logical security"' showing total 1,083 results

Search Constraints

Start Over You searched for: Descriptor "Logical security" Remove constraint Descriptor: "Logical security"
1,083 results on '"Logical security"'

Search Results

201. Protecting You

202. Security Issues in Mobile Agents

203. Logical Methods in Security and Privacy

204. A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN

205. Securing Object Oriented Design: A Complexity Perspective

206. Power system DNP3 data object security using data sets

208. COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS

209. Outlook: Cloudy with a Chance of Security Challenges and Improvements

210. AUDIT TEKNOLOGIINFORMASIATAS PHYSICAL SECURITY CONTROL DAN LOGICAL SECURITY CONTROL SERTA PENENTUAN KONDISI SECURITY RISK STUDI KASUS: PT TALC INDONESIA

211. Developing a module-based security system for an intelligent home

212. The implementation guidance for practicing network isolation by referring to ISO-17799 standard

213. Programming languages and program analysis for security

214. Static Security Optimization for Real-Time Systems

215. Intelligent OkiKoSenPBX1 Security Patrol Robot via Network and Map-Based Route Planning

216. Improving wireless security through network diversity

217. A criterion-based multilayer access control approach for multimedia applications and the implementation considerations

218. Design and Implementation of an Authentication Method for Secure Distribution and Use of E-documents in Online Environment

219. A role-based access in a hierarchical sensor network architecture to provide multilevel security

220. Containing the Ultimate Trojan Horse

221. Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC

222. Evaluating information security tradeoffs: Restricting access can interfere with user tasks

223. Model Driven Development of Security Aspects

224. Securing Access in Network Operations — Emerging Tools for Simplifying a Carrier's Network Security Administration

225. Toward Application-Aware Security and Reliability

226. The security challenges for mobile ubiquitous services

227. A Dynamic Trust Model Enforcing Security Policies

228. Behavioral and Dynamic Security Functions Chaining For Android Devices

229. Protecting services from security mis-configuration

230. Experience report: A field analysis of user-defined security configurations of Android devices

231. Towards security assurance for heterogeneous industrial networks

232. Development of the Security Evaluation Methodology and Criteria for a Ubiquitous Healthcare System

233. Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation

234. Context-aware Role-based Access Control Using Security Levels

235. A study on attacker agent in virtual machine-based network security learning system

236. SDN-based security services using interface to network security functions

237. Mobile security technology for smart devices

238. Towards an Integration of Usability and Security for User Authentication

239. Automatic detection of vulnerabilities for advanced security analytics

240. The Design and Implement of Security Access Device Centralized Supervision System for Power Grid Enterprises

241. Software as a service: Understanding security issues

242. Security aware network controllers for next generation automotive embedded systems

243. SDSecurity: A Software Defined Security experimental framework

244. Information security trades in tactical wireless networks

245. Network systems security analysis

246. Optimal placement of sequentially ordered virtual security appliances in the cloud

247. User Security in e-Learning System

248. Information Security Considerations for Protecting NASA Mission Operations Centers (MOCs)

249. Overview of security on mobile devices

250. A Survey on Interfaces to Network Security Functions in Network Virtualization

Catalog

Books, media, physical & digital resources