A security policy based on data integrity verification / Omar Hussein Sayed Mohamed ; Supervised Osman Hegazy Mohamed , Amany Mousa Mohamed , Fatma A. Ellicy
Material type:
- سياسة تأمينية معتمدة علي تحقق تكامل البيانات [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2009.Om.S. (Browse shelf(Opens below)) | Not for loan | 01010110051045000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2009.Om.S. (Browse shelf(Opens below)) | 51045.CD | Not for loan | 01020110051045000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.18.02.M.Sc.2009.Ma.T Towards a web in three dimensions / | Cai01.18.02.M.Sc.2009.Ma.T Towards a web in three dimensions / | Cai01.18.02.M.Sc.2009.Om.S. A security policy based on data integrity verification / | Cai01.18.02.M.Sc.2009.Om.S. A security policy based on data integrity verification / | Cai01.18.02.M.Sc.2009.ta.B Building A speech recognition system for spoken Arabic / | Cai01.18.02.M.Sc.2009.ta.B Building A speech recognition system for spoken Arabic / | Cai01.18.02.M.Sc.2009.Us.F Fuzzy rough set approaches for data clustering / |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Science
Data is valuable , only , when it is correct and accurate. In this thesis , focus is driven towards safeguarding stored data integrity from new malicious software (Malware) attacks , and unauthorized modification attacks committed by insiders
Issued also as CD
There are no comments on this title.