Search Results - attack ad*
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 4
- Security measures 4
- Computer security 2
- Management 2
- Access control 1
- Automatic control 1
- Business enterprises 1
- Computer science 1
- Computer viruses 1
- Computers 1
- Congresses 1
- Criminal law 1
- Cyberterrorism 1
- Firewalls (Computer security) 1
- Information technology 1
- Law and globalization 1
- Medical parasitology 1
- Metabolism 1
- Parasites 1
- Parasitic diseases 1
- Prevention 1
- Self-adaptive software 1
-
1
-
2
-
3
Security and policy driven computing
Published 2011Table of Contents: “…Finite automata for evaluating testbed resource contention -- 7. Adaptive buffer tuning for data intensive algebraic operations -- 8. …”
-
4
-
5
The best damn firewall book period
Published 2007Table of Contents: “…User authentication -- 25. Routing -- 26. Address translation…”
-
6
Globalisation, criminal law and criminal justice : theoretical, comparative and transnational perspectives
Published 2017Table of Contents: “…The interplay of criminal and administrative law in the context of market regulation: the case of serious competition infringements -- 10. …”
Table of contents only
-
7
Comprehensive analysis of parasite biology : from metabolism to drug discovery
Published 2016Table of Contents: “…Mathematical approaches to drug and target discovery. mathematical modeling and omic data integration to understand dynamic adaptation of apicomplexan parasites and identify pharmaceutical targets -- 21. …”
-
8