Displaying 29551 - 29560 of 37748

The computing and telecommunications industries are more closely knit than ever before.

The computing and telecommunications industries are more closely knit than ever before.

PAYOFF IDEA. When necessary, UNIX(TM) system installations can be made very secure.

"Dr. Mike Schabel, Ty Sagalow, Bob Thornberry, Marco Raposo, and Aleksei Resetko were contributors to Chapters 2 and 3 ... Dr. Jim Kennedy wrote Chapter 4.

1 The World of Cyber Security in 2019 2 The Costs and Impact of Cyber Security 3 Protecting Web 2.0: What Makes it so Challenging?

The security architecture of the Plan 9(TM) operating system has recently been redesigned to address some technical shortcomings.

A modular security management system (SMS) functional architecture is defined for enterprise network applications.

Compares various interlocking systems-mechanical, electromechanical, relay, and geographic-in connection with route establishment, route security, signal control, and establishing the normal positi

This chapter describes the security architecture of the most relevant modern wireless and mobile systems, with the main weight on 3rd Generation Partnership Program (3GPP) and Institute of Electric

During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture.

Explore more

Video

AI-enhance wireless reliability: joint source and channel coding for robust 6G air interface

Podcast

A 2025 recap of "a bit of tech"