Query Result Set
Skip Navigation Links
   ActiveUsers:1460Hits:19105933Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
COMPUTER NETWORKS (8) answer(s).
 
SrlItem
1
ID:   052004


Intelligent networks: principles and applications / Anderson, John 2002  Book
Anderson, John Book
0 Rating(s) & 0 Review(s)
Publication London, Institution of Electrical Engineers, 2002.
Description xi, 226p.
Standard Number 0852969775
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046383004.6/AND 046383MainOn ShelfGeneral 
2
ID:   051922


Internet Security: cryptographic principles, algorithms and protocols / Rhee, Man Young 2003  Book
Rhee, Man Young Book
0 Rating(s) & 0 Review(s)
Publication New York, John Wiley & Sons Inc., 2003.
Description xvii, 405p.
Standard Number 0470852852
Key Words Internet  Internet Security  Computer networks 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046625005.82/RHE 046625MainOn ShelfGeneral 
3
ID:   160361


Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security / Newlove-Eriksson, Lindy   Journal Article
Newlove-Eriksson, Lindy Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Corporatisation of critical information infrastructure (CII) is rooted in the ‘privatisation wave’ of the 1980s-90s, when the ground was laid for outsourcing public utilities. Despite well-known risks relating to reliability, resilience, and accountability, commitment to efficiency imperatives have driven governments to outsource key public services and infrastructures. A recent illustrative case with enormous implications is the 2017 Swedish ICT scandal, where outsourcing of CII caused major security breaches. With the transfer of the Swedish Transport Agency’s ICT system to IBM and subcontractors, classified data and protected identities were made accessible to non-vetted foreign private employees – sensitive data could thus now be in anyone’s hands. This case clearly demonstrates accountability gaps that can arise in public-private governance of CII.
        Export Export
4
ID:   049037


Mastering global information systems / Buchanan, William 1997  Book
Buchanan, William Book
0 Rating(s) & 0 Review(s)
Publication Hampshire, macmillan Press, 1997.
Description xii, 264p
Series Macmillan master series
Standard Number 0333689518
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
039702004/BUC 039702MainOn ShelfGeneral 
5
ID:   049035


Maximum security: a hacker's guide to protecting your Internet site and network 1998  Book
Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Techmedia, 1998.
Description xxii, 885p.
Standard Number 8176350397
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
039846004.65/MAX 039846MainOn ShelfGeneral 
043815004.65/MAX 043815MainOn ShelfGeneral 
6
ID:   049034


MCSE study guide: Windows 95 and networking essentials / Casad, Joe; Chisholm, Leigh Anne; Heywood, Drew; McLaren, Tim 1996  Book
Casad, Joe Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Techmedia, 1996.
Description xxvi, 905p.
Standard Number 8187105437
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
039847005.3/CAS 039847MainOn ShelfGeneral 
7
ID:   124058


My other combat system is a network / Mills, James H.; Adams, Jim   Journal Article
Mills, James H. Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The article discusses the use of information technology (IT) by the U.S. Navy for improving its warfare capability. Since the 1990s, the Navy has made efforts to embed networking and information technology (IT) to improve operational and fiscal efficiency. The Navy has been the first service to have implemented cyber systems and continue to optimize these capabilities with increasing investments in unmanned and autonomous systems.
        Export Export
8
ID:   030739


Network communities: the computers in our life / Johnson, Timothy 1971  Book
Johnson, Timothy Book
0 Rating(s) & 0 Review(s)
Publication London, WeidenFeld and Nicolson, 1971.
Description 175p
Standard Number 0297004441
Key Words Computer networks 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
007697004.6/70 007697MainOn ShelfGeneral