Showing 1 - 20 results of 127 for search '', query time: 0.02s Refine Results
  1. 1
  2. 2

    Preventing reverse engineering of native and managed programs by Kiperberg, Michael, kirjoittaja

    Published 2015
    Linkki verkkoaineistoon
    Doctoral dissertation
  3. 3
  4. 4

    Applications of hypervisors in security by Leon, Roee Shimon, kirjoittaja

    Published 2019
    JYX-julkaisuarkisto / JYX Digital Archive
    Doctoral dissertation
  5. 5
  6. 6
  7. 7

    The emergence of mobile electronic commerce : [enabling technologies and usability issues] by O'Donoghue, Niall

    Published 1998
    Master's thesis
  8. 8

    Network security with free solutions by Bogadi, Prudvee Raj

    Published 2006
    Master's thesis
  9. 9

    Security in Mobile IP networks by Ghebregziaher, Tewolde Andemariam

    Published 2005
    Master's thesis
  10. 10

    Comparison of software vulnerability auditing tools by Eränen, Harri

    Published 2007
    Master's thesis
  11. 11

    Distributed denial-of-service attacks in the Internet by Penttinen, Tuomo

    Published 2005
    Get full text
    Master's thesis
  12. 12

    Feature selection in anomaly-based network intrusion detection systems by Paananen, Harri

    Published 2010
    Master's thesis
  13. 13
  14. 14
  15. 15

    Communication in the software vulnerability reporting process by Havana, Tiina

    Published 2003
    Get full text
    Master's thesis
  16. 16

    The SSH 2 secure login protocol by Saarinen, Markku-Juhani O.

    Published 1999
    Master's thesis
  17. 17

    Multi-slot IP data in TETRA by Puoskari, Sami

    Published 2003
    Master's thesis
  18. 18
  19. 19

    Security of wireless connectivity : a case study by Chassan, Alexandre

    Published 2005
    Master's thesis
  20. 20

    Analysis and semantic description of role based access control models by Naumenko, Anton

    Published 2004
    Master's thesis
Search Tools: RSS Feed