Chapter |
File Downloads |
Abstract Views |
Last month |
3 months |
12 months |
Total |
Last month |
3 months |
12 months |
Total |
A Cost Effective Solution in Intercomputer Communication |
0 |
0 |
0 |
1 |
0 |
1 |
2 |
53 |
Biztonságos és költséghatékony kommunikáció |
0 |
0 |
0 |
6 |
0 |
0 |
0 |
68 |
How Kournikova can help to steal data? |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
36 |
How to Measure an Information System's Efficiency? |
0 |
0 |
0 |
142 |
0 |
0 |
0 |
665 |
Information Management in the Higher Education -- The Role and Importance of the Different Technologies |
0 |
0 |
0 |
15 |
0 |
1 |
2 |
91 |
Információbiztonság, technikai alapismeretek |
1 |
1 |
1 |
17 |
1 |
1 |
2 |
74 |
Life is Short. Have another Affair – Password Security |
0 |
0 |
1 |
9 |
0 |
0 |
1 |
60 |
Password strength and memorability |
0 |
0 |
1 |
27 |
1 |
1 |
3 |
157 |
Price, value and security. How to manage a database on somebody's own |
0 |
0 |
0 |
23 |
0 |
0 |
0 |
184 |
Some Special Fields of Data Security |
0 |
0 |
0 |
23 |
0 |
0 |
1 |
177 |
Tanúsítványokról |
0 |
0 |
1 |
4 |
0 |
0 |
2 |
51 |
Total Chapters |
1 |
1 |
4 |
268 |
2 |
5 |
14 |
1,616 |