6,461 results on '"Gold, Steve"'
Search Results
2. Biometrics at the border
3. Challenges ahead on the digital forensics and audit trails
4. Financial services sector puts voice biometrics at heart of fraud battle
5. The evolution of payment card fraud
6. In search of a new perimeter
7. Understanding the digital fingerprint
8. Meeting the biometrics payment security challenge
9. Healthcare biometrics: solving the staff and patient security governance challenge
10. Subverting cellular technology: evolution, not revolution
11. Getting lost on the Internet: the problem with anonymity
12. Black Hat Europe: mobile attack vectors in the spotlight
13. Iris biometrics: a legal invasion of privacy?
14. Electronic countersurveillance strategies
15. RapidDNA: a game changer in the law enforcement identification stakes
16. Virtual jihad: how real is the threat?
17. Enterprise biometric integration under the microscope
18. Cellular jamming
19. Border control biometrics and surveillance
20. Biometrics at the ATM – the need for customer authentication
21. Wireless cracking: there's an app for that
22. Securing VoIP
23. Biometrics fit to secure the London Olympics
24. Dis-Jointed? Several Approaches to Divisibility After Burlington Northern
25. The cookie monster
26. Understanding the hacker psyche
27. Cracking wireless networks
28. Android insecurity
29. Cracking cellular networks via femtocells
30. The rebirth of phreaking
31. Terrorism and Bluetooth
32. Taking down botnets
33. The future of the firewall
34. Cracking GSM
35. IPv6 migration and security
36. Advanced evasion techniques
37. Vital signs strong for healthcare biometrics
38. The privacy imperative
39. Biometrics – a global review
40. Break for the border
41. Winning acceptance among privacy-aware consumers
42. Understanding the drivers for secure data storage
43. Why WPA standards won't protect your network
44. Securing the National Health Service
45. Protecting the cloud: attack vectors and other exploits
46. Social engineering today: psychology, strategies and tricks
47. Password alternatives
48. Cracking passwords
49. Military biometrics on the frontline
50. Healthcare biometrics — defending patients and their data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.