Exploring Traffic Pricing for the Virtual Private Network
Information Technology and Management
Security at the Internet Layer
Computer
Estimating the Scalability of the Internet Key Exchange
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Authorization Methods for E-Commerce Applications
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Design security for internet-based workflow management systems adopting security agents
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
LATONA: an advanced server architecture for ubiquitous sensor network
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Hi-index | 0.00 |
From the Publisher:Here is a comprehensive, crystal clear examination into the latest techniques and mechanisms used to help protect Internet and intranet access and communication services. Authored by an international expert in information technology and computer security systems, Internet and Intranet Security helps computer and networking engineers understand, develop, and support secure TCP/IP-based networks, and enables security professionals to build efficient systems for safeguarding commercial Internet applications.