Search Results
ArticlesSee all articles results »
From journals and magazines
-
COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEB7Ekx7EF_gse_Aaunk2C6VQl12sotXtltLTkseGnkRE_7-bpIf11INCTiFk8k0gmRmG7wO4w621I5UaxLhUyDPKIaVthpjgxkjMDAvFnJV8XJO3SpZ5T-rL94RFeuDouKFRqTaEO0JFynDLZGacNSMrmGszg7V_fbusvJdMheoKJZwEhVKvZ4K6oJj-IuUPv0d5DEfbsC-ZRnMnsNe-n8JhjwzwDKbjzSSfP78uuwAzeSnq1bx6Gg83k2RR5MtqVq-TXQvOYVYWdf6A_Amaj8gj0Xhm5zDR4W22eJtdeOkFJCm2UlPBscOaOWFVN6gUFnvtKSfIJdz_3dDVf2xyDQdenz32f9zA_tfnd3sbdRcG4cYGvtly8QPXkZ-g
Carpathian Journal Of Electrical Engineering, Volume 17, Issue 1, pp. 150 - 157
Journal Article : Full Text Online
-
Computer network security evaluation simulation model based on neural network
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3daxQxEA-nvuiD-AVWq-Sh9sEj9LKfWSgVrbdorYq6h5Y-LNlNwh3Ya-lehfaf8V91ZpPs7cEpinAst7ndcMz8kswkM78hZItrpVI5qlkUC8mQUY7JSmUsSuK6Fjyqo3Yz56s4OAo-fRb5_mDw0-fCtLHM6J83bqisyXLAfFWMb7z0FaZezNzBOu4vjfjrybtxCb5vsf0DNNu7B6X7Ebj9LMz_Fy_QBojB_Nt_wEzXKTTAd0AOXAE7cP0r9PhiD8O5DRMfNq7OXY8efNjMTlzxL1tQZ4hLosLjB2TJBN27l39jAM86NtBFC0BzcXV16ailO0u_cPvZR36JbeNMpqeNnrfweH86lScuQcttXmC-1MrmRT8uyQb-LWOZcDYGe4mBAeK4sm0bOFhMZLaGh5_CLW-Mg2rYm49hgknXLRRhgBvZ-cHb_EtL0GqztFfpuD98LPPJ4WFZjL8V18iNAG0ptLdfTbpjqjQOLN2F-582ARQ73-l1vWry9Fb8wJkxxR1y24mfvrQqv0sGen6P3OqxUt4nx7vTPa9_6lS4uzPdox4DdIkBusQAbTFAWwxQuLUYoNBZr48HZJKPi_03zNXgYDX41gumlTAKpK0DIyMZZwZcUKmTUMUZePqxFjJNjK5qnkWgGZWmiYq5SutKGBFEiocPCR1xJaowibnhVWQSJeETikRxLJVmkmCDPPfyKWvHTI8FUr6X4KGiMEsUZmmFuUG2uofPLCHL-sc2vaBLN66aEtztEDx2WP8f_fnnx-TmEq2b5Pri_EI_seVCnrYI-AXHS4x9
Journal Of Intelligent & Fuzzy Systems, Volume 37, Issue 3, pp. 3197 - 3204
Journal Article : Full Text Online
-
Analysis of Data Encryption Algorithms for Telecommunication Network-Computer (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bS8MwFA7TIeiDd3A6Rx70SeKapklTkMmcG15geEX0paRJ6wTvm8j89SZtotuD-iKUlraht3P4cnJ68n0AbOBUqVB4EgWUC2QY5ZBIVIQCRqXkOJBBnsy54kfX_ukZ77RKoOvmwpiySoeJOVCrJ2ly5HVDpK7dMQi93ecXZFSjzN9VJ6EhrLSC-UNDIz4ByhqSI-3x5b129-TsC5uJ51sGVQ9xxiJXCk-pyQLguhG3xqYieqSTmuqZ0fH73ThaE9sFdebA0D18Xn-9XdSfFJmIscJsx_D4f-85D2Zt3AqbhaMtgFL6uAhmRtgMl8CHIziBTxncFwMB24_ydZhjEmze3-q7DHoPfajDZHhh5HdG56bAnV6jW5Sk79R7DaR3neAEHDkOxya0wHOrvrcMLjvti9YBstIOSBISDhBNdRwqvEiEOEs4j3wdFmIpEhLoz8-ShGRK6I5SUMWIDgoFS32usIoyqhGJqpCsAOhhxRPCKM5wEmRMCb0QzhQ2ClwZ8ytgyxkxlpbw3Ohu3Mf5wIfS2Jg8tiavgM2v1s8F0ccP7TasP_zRrOrMG1tU6Mfftl39_fQamDYXK1I9VTA5eH1L1wu5ipp1ab09aB12bmpg4jhEen1Cbz4BNtEG1w
Wireless Communications And Mobile Computing, Volume 2021, Issue 1.
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
-
Computer network security
https://find.library.duke.edu/catalog/DUKE99119329042708501
Book : View Online
-
Computer network architectures
https://find.library.duke.edu/catalog/DUKE000520602
Book
Check Holdings for this item's availability Perkins & Bostock Library, TK5105.5 .M44 1983
Our WebsiteSee all website results »
Guides, policies, news more
-
Computer Labs & Software | Duke University Libraries
https://library.duke.edu/using/labs-software
Printers at the Libraries Scanners at the Libraries Computer Labs and Workstations Where can I find a computer lab?
-
Find Books - Electrical & Computer Engineering - LibGuides at Duke University
https://guides.library.duke.edu/c.php?g=289274&p=1929207
Find Books - Electrical & Computer Engineering - LibGuides at Duke University Skip to Main Content Home LibGuides Electrical & (...)
-
Doing Research at Other Institutions | Duke University Libraries
https://library.duke.edu/research/doing-research-at-other-institutions
DukeCard : Make sure you have your DukeCard and that you take it with you. Configure your computer : Configure your computer (...)
Collection GuidesSee all collection guides results »
Detailed inventories of archival collections
-
Dean Gallea Computer Network, 2002 Aug. 06
https://archives.lib.duke.edu/catalog/craudiovisual_aspace_794c4c74fcd29ec26a43773480ecb479
In: Consumer Reports. Audiovisual materials, 1940-2022 and undated » Public Relations and Publicity, 1961-2011, undated » Media Coverage, 1961-2010, undated -
Dismantling of computer network and back-up, 2001
https://archives.lib.duke.edu/catalog/sigi_aspace_ref1195_e1l
In: Sisterhood is Global Institute records, 1963-2010 and undated, bulk 1980-2002 » Administrative Files Series, 1975-2004 and undated » Other Records Subseries, 1985-2003 and undated, bulk 1997-2001 » Office closure -
Computers-Networks (mainframes, etc.)
https://archives.lib.duke.edu/catalog/jwtinfocentervf_aspace_ref502_pnh
Archival MaterialsSee all archival materials results »
Manuscripts and archival materials
-
Virtualized network storage
https://find.library.duke.edu/catalog/DUKE003222507
Archival and manuscript material, Book
Check Holdings for this item's availability Library Service Center, University Archives
-
Towards building a network security infrastructure
https://find.library.duke.edu/catalog/DUKE002978860
Archival and manuscript material, Book
Check Holdings for this item's availability University Archives, Library Service Center
-
Dependability modeling of computer systems and networks
https://find.library.duke.edu/catalog/DUKE002635987
Archival and manuscript material, Book
Check Holdings for this item's availability Library Service Center, University Archives
Some materials and descriptions may include offensive content. More info