Search

Your search keyword '"Internet -- Management"' showing total 1,440 results

Search Constraints

Start Over You searched for: Descriptor "Internet -- Management" Remove constraint Descriptor: "Internet -- Management"
1,440 results on '"Internet -- Management"'

Search Results

1. Internet management issues : a global perspective.

2. Double marginalization in performance-based advertising: implications and solutions

3. Copyright, copy-left, copygift

4. Eastern promise

5. Correlation-based traffic analysis attacks on anonymity networks

7. Fighting intrusions into wireless networks

8. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors

9. Tagging: an organization scheme for the Internet

10. Admission control based on available bandwidth estimation for wireless mesh networks

11. PPAB: a privacy-preserving authentication and billing architecture for metropolitan area sharing networks

12. A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks

13. Man-in-the-middle attacks on auto-updating software

14. A divide-and conquer strategy for thwarting Distributed Denial-of-Service attacks

15. Optimal dispersal of certificate chains

16. The art of the possible; Prospects

17. Security enhancement on a new authentication scheme with anonymity for wireless environments

18. Attribute-based access control with hidden policies and hidden credentials

19. GENI design principles

21. Security framework for wireless sensor networks

22. You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers

23. Improving memory encryption performance in secure processors

24. A Management Perspective on Risk of Security Threats to Information Systems

27. Worm epidemics in high-speed networks

30. Advocating online censorship

31. Ownership issues in the digital divide.

32. Continuous 'Morphing': Competiting Through Dynamic Capabilities, Form, and Function

34. Enhancing e-communities with agent based systems

35. Internet accounting

37. Consumer privacy rights: CPR and the age of the Internet

39. Dynamics of infrastructure development: the role of metaphors, political will and sunk investment

40. Advances in network simulation

41. An Asian perspective on Internet management

44. The cyber-war

46. Access control is easy (unless you're doing it for everyone)

47. View state security

48. The new security paradigm

49. Bridging DNS' islands of trust

50. Securing your Silverlight application

Catalog

Books, media, physical & digital resources