Results 261 to 270 of about 186,948 (311)
In a variety of settings, some payoff-relevant item spreads along a network of connected individuals. In some cases, the item will benefit those who receive it (for example, a music download, a stock tip, news about a new research funding source, etc.) while in other cases the impact may be negative (for example, viruses, both biological and electronic,
Ramakrishna Thurimella, Leemon C. Baird
+8 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network security (security in large networks)
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2002It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals.
S. Singh, M. Singh
openaire +2 more sources
Proceedings of the 4th annual conference on Information security curriculum development, 2007
Information Security has emerged as one of the biggest concerns that network administrators and other stakeholders face today. Most data custodians face Information Security risks on a daily basis; thus, it is up to Information Security professionals to research these threats and exploits to secure private information from unauthorized access and ...
openaire +3 more sources
Information Security has emerged as one of the biggest concerns that network administrators and other stakeholders face today. Most data custodians face Information Security risks on a daily basis; thus, it is up to Information Security professionals to research these threats and exploits to secure private information from unauthorized access and ...
openaire +3 more sources
Securing Network Servers [PDF]
Abstract : The development of computer networks has resulted in an important class of computers: network servers. The primary purpose of these machines is to provide services, including both computational and data services, to other computers on the network. Because of their service role, it is common for servers to store many of an organization's most
Klaus-Peter Kossakowski+4 more
openaire +1 more source
Proceedings 1996 IEEE Symposium on Security and Privacy, 1999
We describe the design and implementation of secure network objects, which provide security for object-oriented network communication. The design takes advantage of objects and subtyping to present a simple but expressive programming interface for security, supporting both access control lists and capabilities.
L. van Doorn+3 more
openaire +2 more sources
We describe the design and implementation of secure network objects, which provide security for object-oriented network communication. The design takes advantage of objects and subtyping to present a simple but expressive programming interface for security, supporting both access control lists and capabilities.
L. van Doorn+3 more
openaire +2 more sources
2018
In the previous chapter, we saw how to work with data. Most of this data will probably come from some kind of backend over a network. In this chapter, we see how we can transfer this data from a backend to our app in several ways. Associated with sending and receiving data is connectivity.
Steven Thewissen, Gerald Versluis
openaire +2 more sources
In the previous chapter, we saw how to work with data. Most of this data will probably come from some kind of backend over a network. In this chapter, we see how we can transfer this data from a backend to our app in several ways. Associated with sending and receiving data is connectivity.
Steven Thewissen, Gerald Versluis
openaire +2 more sources
2008
The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to ...
openaire +2 more sources
The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to ...
openaire +2 more sources
Managing network security: Simulating network security
Network Security, 1999Abstract Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities.
openaire +2 more sources