Search ResultsElectronic Resources 
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
various security policies. This book would be an invaluable addition to any university course in computer
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
Scientific Data; Color Plate Section; Chapter 5. History and Contributions of Theoretical Computer Science
by
Miller, Bruce, author.
Format:
Excerpt:
employed in the US who use a computer and are aware of a security policy. Individual and aggregate factor
by
Hutton, William James, III., author.
Format:
Excerpt:
particularly vexing problem in computer security: how to improve upon the ubiquitous password for user
by
Burney, Micaela L., author.
Format:
Excerpt:
techniques, the current status in the computer age, and how it relates this to forensic, security, and legal
by
Zhang, Zhiming, author.
Format:
Excerpt:
modification, and leak of confidential information. To address the security threats on FPGA systems, majority
by
See, Timothy W., Jr., author.
Format:
Excerpt:
university computer labs. While the university labs were fully capable of running this module, Docker was
by
Tsoutsos, Nektarios Georgios, author.
Format:
Excerpt:
cause to these problems is that modern computer architectures have always been designed for performance
by
Ansong, Amy G., author. (orcid)0000-0002-7053-0096
Format:
Excerpt:
aeronautical engineering, mechanical, systems (2), civil, and cyber security engineering. In total, 153 toys
by
Ogemuno, Emamuzo Cletus, author.
Format:
Excerpt:
research in recent times. This is due, in part, to the increased importance of cyber-security, computer or
by
Raff, Edward, author.
Format:
Excerpt:
importance of cyber security and the prevention of malware. Beyond just the home computer, smart
by
Sklavos, Nicolas. editor.
Format:
Excerpt:
) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing

Select an Action





