login
You are not logged in.
search:
AMSER logo

Search Results



|< << <
> >> >|
Order:

Searched for: Key Concept is Computer science -- Security and privacy
Results 31 - 35 of 55
Gordon and Mike's ICT Podcast offers perspectives on the information and communication technologies (ICT) industries from Gordon Snyder and Mike Qaissaunee. In this podcast, the hosts discuss a variety of topics...
A paper presented at the 2003 International Cryptology Conference considers the vulnerability of embedded cryptosystems to side channel attacks, which are different from normal security violations because they involve...
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Douglas Tabbutt, provides a basic lesson on firewalls. This learning...
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Douglas Tabbutt, provides an interactive lesson on packet filters to...
This article presents an analysis of 802.11x network systems on three key fronts: throughput, security, and cost. Wireless local area networks (WLANs) are increasingly popular, but should they completely replace wired...
user login
Username:
Password:
why log in?
Manage your resources
Save, organize, and share resources that you find.

Subscribe to bulletins
Automatically be notified about new resources that match your interests.

It's easy, fast, and FREE!
Have a favorite applied math or science site you want others to know about?

SUGGEST a
NEW RESOURCE
to add to AMSER

Copyright 2015 Internet Scout Resource Metadata
Copyright 2015 Internet Scout
NSF NSDL University of Wisconsin Internet Scout
Leave Feedback
http://amser.org/