CORC

浏览/检索结果: 共7条,第1-7条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
IMPORTANCE AND SIGNIFICANCE OF INFORMATION SHARING IN TERRORISM FIELD. 期刊论文
Science International, 2014, 卷号: Vol.26 No.5, 页码: 1719-1725
作者:  Shibghatullah,AbdulSamad;  Yusof,Robiah;  Alaameri,Alaa;  Abaas,Thamer
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Smartphone security: understanding smartphone users\' trust in information security management 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2014, 卷号: Vol.7 Special I, 页码: 1313-1321
作者:  Chang,SE;  Jang,YT;  Tsai,YJ
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Authenticated identity-based private key sharing scheme and its application. 期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, 卷号: Vol.31 No.5, 页码: 1507-1510
作者:  FENGHua-min;  SUNYing;  SUNYi-ru
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
THE PERSPECTIVES ON PERSONAL HEALTH RECORD IN HIGHER EDUCATION INSTITUTION. 期刊论文
Science International, 2014, 卷号: Vol.26 No.5, 页码: 1905-1908
作者:  AbdulGhani,MohdKhanapi;  Jano,Zanariah;  AkmarEmran,Nurul;  Kanchymalay,Kasturi;  MdLeza,FathinNabilla
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
An Evaluation of the Impact of ICT Technologies Practice on Internal Control Security System. 期刊论文
Annual International Conference on Infocomm Technologies in Competitive Strategies, 2014, 页码: 101-106
作者:  Muchenje,Tonderai;  Kariga,Progress
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
FREQUENCY RANGE DECOMPOSITION ACCORDING TO COMMUNICATION SYSTEMS AND MEANS 期刊论文
Modern Information Technologies in the Sphere of Security and Defence, 2014, 卷号: No.3, 页码: 37-44
作者:  OleksandrY.Salii
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
NETWORK THREATS THAT CAN AFFECT ELECTRONIC BUSINESS. 期刊论文
Horizons Series A, 2014, 卷号: Vol.1, 页码: 63-71
作者:  Stojkovski,Viktorija;  Nenovski,Blagoj
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace