 |
|
|
|
|
|
|
 Information Security and Ethics: Social and Organizational IssuesInformation Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student... |  |  Expert Network Time Protocol: An Experience in Time with NTPHave you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, it’s due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they... |  |  Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |
|
|
Result Page: 64 63 62 61 60 59 58 57 56 55 |