*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 101 - 120 *of* 269

102

APPLIED CRYPTOGRAPHY IN DESIGNING E-LEARNING PLATFORMS.
MIHAILESCU, Marius Iulian ; NITA, Stefania Loredana ; CORNELIU, Pau Valentin
eLearning & Software for Education; 2020, Vol. 2, p179-189, 11p

CRYPTOGRAPHY DATA encryption ENCRYPTION protocols DIGITAL signatures ALGORITHMS MOBILE learning
*Conference*
103

ACCESS SECURE to Report Data. (cover story)
de Clercq, Jan
SQL Server Magazine; Jun2007, Vol. 9 Issue 6, p35-37, 3p, 3 Illustrations

SQL COMPUTER security SECURITY systems DATA protection GOVERNMENT regulation
*Periodical*
104

Encryption in SQL Server.
Carter, Peter A.
Securing SQL Server; 2016, p69-96, 28p

*Book*
105

WEB Q & A.
Michell, Nancy
MSDN (1528-4859). Mar2004, Vol. 19 Issue 3, p17-20. 4p.

Computers Computer software Computer industry
*Periodical*
106

SQL Server Audit.
Carter, Peter A.
Securing SQL Server; 2016, p35-53, 19p

*Book*
107

WASM -- A Metric for Securing a Web Application.
Kumar, Rakesh ; Kaur, Gurvinder
Journal of Research & Practice in Information Technology. Feb2014, Vol. 46 Issue 1, p19-29. 11p.

Website security Web-based user interface... Computer network securit... Systems design Computer hacking
*Academic Journal*
108

SQL Server Security Model.
Carter, Peter A.
Securing SQL Server; 2016, p15-33, 19p

*Book*
109

Securing System i Access for Web.
Beckman, Mel
System iNEWS. Jun2009, Issue 356, p35-38. 4p. 1 Color Photograph, 1 Diagram, 2 Charts, 1 Map.

International Business M... Databases SQL Programming languages Electronic data processi...
*Periodical*
110

The Case of the Wicked Wrist Rapper.
B.I. Powers
SQL Server Magazine; Aug2006, Vol. 8 Issue 8, p49-50, 2p

COMPUTER security DATABASES COMPUTER users SQL INFORMATION storage & re...
*Periodical*
111

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
Bashah Mat Ali, Abdul ; Yaseen Ibrahim Shakhatreh, Ala’ ; Syazwan Abdullah, Mohd ; et al.
Procedia Computer Science. Jun2011, Vol. 3, p453-458. 6p.

SQL Scanning systems Automatic control system... Web services Cyberterrorism Information technology s...
*Academic Journal*
112

SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud.
Singh, Niharika ; Singh, Ashutosh Kumar
Pertanika Journal of Science & Technology; Jan2019, Vol. 27 Issue 1, p159-174, 16p

CLOUD storage CLOUD computing WIRELESS sensor nodes SQL DATA security
*Academic Journal*
113

ENHANCING THE SECURITY LEVEL OF THE NEW VERSION OF THE EASY-LEARNING ONLINE PLATFORM.
RĂDESCU, Radu ; PAŞCA, Sever
eLearning & Software for Education; 2017, Vol. 2, p158-163, 6p

MOBILE learning VIRTUAL classrooms COURSEWARE DISTANCE education ONLINE education
*Conference*
114

Secure Online Medicine Delivery System.
Bhat, Mohammad Waqar ; Thippeswamy, Veerabhadrappa Sondekere ; Bhushan, Himanshu ; et al.
Review of Computer Engineering Studies; Sep2020, Vol. 7 Issue 3, p74-78, 5p

INTERNET pharmacies DRUG delivery systems DATABASES DATA encryption ELECTRONIC commerce
*Academic Journal*
115

Check Point secures VPN.
Garcia, Andrew
eWeek. 3/14/2005, Vol. 22 Issue 11, p60-62. 2p. 2 Color Photographs, 1 Chart.

COMPUTER network securit... COMPUTER software develo... COMPUTER security LICENSE agreements COMPUTER industry CHECK Point Software Tec...
*Periodical*
116

MAKING RADIUS EASY AS PI.
Robinson, Frank
Network Computing. 5/27/2004, Vol. 15 Issue 10, p77-87. 7p. 1 Color Photograph, 2 Charts.

LUCENT Technologies (Com... FUNK Software Inc. INTERLINK Networks Inc. COMPUTER systems RADIUS (Computer network... WIRELESS LANs
*Periodical*
117

Access 2002 Enterprise Developer's HandbookTM
Litwin, Paul ; Getz, Ken ; Gunderloy, Mike ; et al.

Database management Business--Data processin...
*eBook*
118

*This result is not displayed to guests*

119

Access 2013 All-in-One For Dummies
Alison Barrows ; Joseph C. Stockman ; Allen G. Taylor ; et al.

Database management
*eBook*
120

*This result is not displayed to guests*


*Filter*