-
4
-
-
80053101987
-
-
John Wiley & Sons, Ltd
-
D.Tebbutt, M. Atherton and T. Lock, "Green IT For Dummies," John Wiley & Sons, Ltd, 2009, pp. 8-14.
-
(2009)
Green IT for Dummies
, pp. 8-14
-
-
Tebbutt, D.1
Atherton, M.2
Lock, T.3
-
5
-
-
64049113450
-
Information security goes green
-
R. Arnfield, "Information Security Goes Green", in infosecurity, 2009, p. 33.
-
(2009)
Infosecurity
, pp. 33
-
-
Arnfield, R.1
-
7
-
-
70849131762
-
A low-cost green IT design and application of VHSP based on virtualization technology
-
Ch. Chang
-
Ch. Chang, "A Low-Cost Green IT Design and Application of VHSP based on Virtualization Technology," inInternational Conference on Computational Science and Engineering, 2009, pp. 255.
-
(2009)
InInternational Conference on Computational Science and Engineering
, pp. 255
-
-
-
8
-
-
20344391930
-
Intel virtualization technology
-
May
-
A.V Bennett, S.M Kagi, "Intel virtualization technology,"IEEE Journal of Computer, vol. 38, pp. 48-56, May 2005.
-
(2005)
IEEE Journal of Computer
, vol.38
, pp. 48-56
-
-
Bennett, A.V.1
Kagi, S.M.2
-
9
-
-
33744479744
-
Apply data mining to defense-in-depth network security system
-
N.F Huang, Ch.N Kao, G.Y. Jai, Ch.L Lin, " Apply data mining to defense-in-depth network security system,"IEEE International Conference on Advanced Information Networking and Applications (AINA), 2005, vol. 1, pp. 159-162.
-
(2005)
IEEE International Conference on Advanced Information Networking and Applications (AINA)
, vol.1
, pp. 159-162
-
-
Huang, N.F.1
Kao, Ch.N.2
Jai, G.Y.3
Lin, C.L.4
-
11
-
-
0012109964
-
-
Honeynet Project Team Second Edition Addison Wesley Professional Publishers. May 27
-
Honeynet Project Team, "Know Your Enemy: Learning about Security Threats", Second Edition, Addison Wesley Professional Publishers. May 27, 2004.
-
(2004)
Know Your Enemy: Learning about Security Threats
-
-
-
13
-
-
70849131762
-
A low-cost green IT design and application of VHSP based on virtualization technology
-
Ch. Hong Chang
-
Ch. Hong Chang, "A Low-Cost Green IT Design and Application of VHSP based on Virtualization Technology," inInternational Conference on Computational Science and Engineering, pp. 256-229, 2009.
-
(2009)
International Conference on Computational Science and Engineering
, pp. 256-229
-
-
-
14
-
-
64049113450
-
Information security goes green
-
Robin Arnfield, "Information Security Goes Green", infosecurity, p. 36, 2009.
-
(2009)
Infosecurity
, pp. 36
-
-
Arnfield, R.1
-
18
-
-
64049113450
-
Information security goes green
-
R. Arnfield, "Information Security Goes Green,"in Infosecurity, 2009, p. 35.
-
(2009)
Infosecurity
, pp. 35
-
-
Arnfield, R.1
-
19
-
-
70350771110
-
-
Arizona State University
-
K. K. Venkatasubramanian, A. Banerjee, S. K. S. Gupta, "Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks, "Arizona State University, 2009, p 240.
-
(2009)
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
, pp. 240
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
20
-
-
70350771110
-
-
Arizona State University
-
K. K. Venkatasubramanian, A. Banerjee, S. K. S. Gupta, "Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks," Arizona State University, 2009, p. 245.
-
(2009)
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
, pp. 245
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
21
-
-
33748476749
-
Applying the OSI seven layer network model to information security
-
November 21
-
Damon Reed, " Applying the OSI Seven Layer Network Model To Information Security," SANS GIAC GSEC Practical Assignment version 1.4b Option One, p. 8, November 21, 2003.
-
(2003)
SANS GIAC GSEC Practical Assignment Version 1.4b Option One
, pp. 8
-
-
Reed, D.1
|