Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in.
Mind, Brain and the Search for God Alasdair Coles CiS conference, The King’s Centre, Osney Mead, Oxford.
Best Approaches to Database Auditing: Strengths and Weaknesses [email protected].
Hands-on Networking Fundamentals Chapter 11 Securing Your Network.
IPv6 Transitioning Ram P Rustagi, ISE Dept, PESIT [email protected] Mar 09-10, 2013.
Using Data Mining to Develop Profiles to Anticipate Attacks Systems and Software Technology Conference (SSTC 2008) May 1, 2008 Dr. Michael L. Martin Uma.