Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
1085 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      various security policies. This book would be an invaluable addition to any university course in computer
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      Scientific Data; Color Plate Section; Chapter 5. History and Contributions of Theoretical Computer Science
      by 
      Hutton, William James, III., author.
      Format: 
      Excerpt: 
      particularly vexing problem in computer security: how to improve upon the ubiquitous password for user
      by 
      Zhang, Zhiming, author.
      Format: 
      Excerpt: 
      modification, and leak of confidential information. To address the security threats on FPGA systems, majority
      by 
      See, Timothy W., Jr., author.
      Format: 
      Excerpt: 
      university computer labs. While the university labs were fully capable of running this module, Docker was
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Excerpt: 
      cause to these problems is that modern computer architectures have always been designed for performance
      by 
      Ansong, Amy G., author. (orcid)0000-0002-7053-0096
      Format: 
      Excerpt: 
      aeronautical engineering, mechanical, systems (2), civil, and cyber security engineering. In total, 153 toys
      by 
      Ogemuno, Emamuzo Cletus, author.
      Format: 
      Excerpt: 
      research in recent times. This is due, in part, to the increased importance of cyber-security, computer or
      by 
      Raff, Edward, author.
      Format: 
      Excerpt: 
      importance of cyber security and the prevention of malware. Beyond just the home computer, smart
      by 
      Sklavos, Nicolas. editor.
      Format: 
      Excerpt: 
      ) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing