Intrusion

Results: 1878



#Item
141

Interactions Between Normal Faults and Igneous Intrusion in Sedimentary Basins Craig Magee1 Christopher Jackson1 Nick Schofield2 1

Add to Reading List

Source URL: workspace.imperial.ac.uk

Language: English - Date: 2012-12-04 08:58:02
    142

    Technical Note: A Few Facts Pertaining to the Low Pressure Performance of a Mercury Intrusion Porosimeter - The Maximum Measurable Pore Size The low pressure range of a mercury porosimeter is used to characterize the lar

    Add to Reading List

    Source URL: www.micromeritics.com

    Language: English - Date: 2016-04-01 01:10:08
      143Computing / Concurrent computing / Computer architecture / Routing algorithms / Distributed data storage / Network architecture / File sharing / Routing protocols / Overlay network / Distributed hash table / Routing / Link-state routing protocol

      Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

      Add to Reading List

      Source URL: www.dsn.jhu.edu

      Language: English - Date: 2016-04-28 20:17:25
      144

      BiH/Prosecutor’s Office: No comment on police intrusion on premises of company “Lijanovici” FENA June 27, 2005 The spokesperson of the BiH Prosecutor’s Office, Edita Pejovic, and Chief of the Public Relations Ser

      Add to Reading List

      Source URL: www.caausa.org

      Language: English - Date: 2005-07-10 17:32:41
        145

        Intrusion detection and Security Auditing “Data Security” - Existing Customer Perspective “Protect what is valuable”. In the times today Databases are the IT equivalent to the safe storing crown jewels. If this s

        Add to Reading List

        Source URL: dimentrix.com

        Language: English - Date: 2012-03-10 01:03:39
          146

          Intrusion Detection Testing and Benchmarking Methodologies Nicholas Athanasiades, Randal Abler, John Levine, Henry Owen, and George Riley School of Electrical and Computer Engineering

          Add to Reading List

          Source URL: www.iwia.org

          Language: English - Date: 2016-01-14 06:08:13
            147

            Microsoft Word - Intrusion Detection Systems as Evidence.doc

            Add to Reading List

            Source URL: www.pmsommer.com

            Language: English - Date: 2013-08-25 05:48:58
              148

              WHITE PAPER CHOOSING THE RIGHT WIRELESS INTRUSION AND PREVENTION POLICIES Choosing the Right Wireless Intrusion and Prevention Policies

              Add to Reading List

              Source URL: www.zebra.com

              Language: English - Date: 2016-04-14 01:59:14
                149

                The Taser Intrusion Recovery System Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li∗ , Eyal de Lara∗ Dept. of Electrical and Computer Engineering, Dept. of Computer Science∗ University of Toronto ABSTRACT

                Add to Reading List

                Source URL: www.eecg.toronto.edu

                Language: English - Date: 2014-04-23 13:14:41
                  150

                  Native Host Intrusion Protection with  RHEL5 and the Audit Subsystem Steve Grubb May 11, 2007 Introduction

                  Add to Reading List

                  Source URL: people.redhat.com

                  Language: English - Date: 2009-10-30 14:24:54
                    UPDATE