View / Download | : | 56850 |
S.No. | Title | Author | Pages | View | Google Scholar |
1 |
Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks |
Nabie Y. Conteh and Paul J. Schmick | 31-38 | 13901 | View |
2 |
The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality |
Hsien-Yu Lee and Nai-Jian Wang | 39-46 | 10612 | View |
3 |
A study of power availability in Oleh community in Isoko South local Government area of Delta state, Nigeria |
S.O. Otuagoma | 47-57 | 10672 | View |
4 |
Transformation of LOG file using LIPT technique |
Amit Kumar Sinha and Vinay Singh | 58-64 | 10705 | View |
5 |
How to secure web servers by the intrusion prevention system (IPS)? |
Yousef Farhaoui | 65-71 | 10960 | View |