Item type | Current library | Home library | Shelving location | Call number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | TK 5105.59 .N379 2013 (Browse shelf(Opens below)) | Available | 5131109 |
TK 5105.59 .K73 2007 Introduction to network security / | TK 5105.59 .M33 2003 Web Security : For Network and System Administrators. | TK 5105.59 .M667 2011 Cisco firewalls / | TK 5105.59 .N379 2013 Network and information security : issues, challenges and research trends / | TK 5105.59 .O78 2008 Nmap in the enterprise : your guide to network scanning / | TK 5105.59 .P375 2013 Implementing Cisco IOS network security : (IINS 640-554) foundation learning guide / | TK 5105.59 .S439 2004 Security and privacy in advanced networking technologies / |
Includes bibliographical references and index.
A robust non-blind audio watermarking scheme for secure distribution of audio files {u2013} Fusion of fingerprints and IRIS biometrics using binary particle swarm optimization {u2013} Meta ensemble classifier based stacked generalization for anomaly based intrusion detection {u2013} A review on network security tools and systems {u2013} Formal verification of firewall anomalies {u2013} A graph based approach for Botnet detection {u2013} Dynamic SQL classification: an empirical study {u2013} A survey on web services and trust in cloud computing environment {u2013} A survey of identity-based signatures {u2013} Side channel attacks: surrent researches and future scopes {u2013} A symmetric key generation scheme using chaos theory {u2013} Desirable features of an identity privacy ensuring solution for UMTS {u2013} A review on security vulnerabilities in cognitive radio networks.
There are no comments on this title.