Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Loading…
Loading…
Organization
Published in Security Technology, Disaster Recovery and Business Continuity
(2010)
Get full text
Book Chapter
Loading…
Loading…
Discovering the Botnet Detection Techniques
Rahim, Aneel, bin Muhaya, Fahad T.
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan
Nabi, Syed Irfan, Nabi, Syed Waqar, Tipu, Syed Awais Ahmed, Haqqi, Bushra, Abid, Zahra, Alghathbar, Khaled
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Figment Authentication Scheme in Wireless Sensor Network
Ambika, N., Raju, G. T.
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Published in Security Technology, Disaster Recovery and Business Continuity (2010)
Get full text
Book Chapter