Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
1085 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      European Symposium on Computer Aided Process Engineering (21st : 2011 : Chalkidiki, Greece)
      Format: 
      Excerpt: 
      discuss progress being made in the area of Computer Aided Process Engineering (CAPE). European industries
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      ); virtualization (virtual machines); scheduling (disk arms); security (TLS). Numerous pseudocode fragments that
      by 
      Murray, Raymond L., 1920-2011.
      Format: 
      Excerpt: 
      radiation and terrorism, nuclear plant security, and use of nuclear techniques to detect weapons materials
      by 
      Aghajan, Hamid K.
      Format: 
      Excerpt: 
      engineers, computer engineers, and graduate students working in signal and video processing, computer vision
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
      by 
      Cardwell, Kevin.
      Format: 
      Excerpt: 
      happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics
      by 
      Reyes, Anthony.
      Format: 
      Excerpt: 
      -profile computer crime cases * Discusses the complex relationship between the public and private sector with
      by 
      St. Denis, Tom.
      Format: 
      Excerpt: 
      multiple precision algorithms. Bignum math is the backbone of modern computer security algorithms. It is
      by 
      Burnett, Mark.
      Format: 
      Excerpt: 
      complexity requirements. A typical computer user must remember dozens of passwords and they are told to make
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      components that make Google so easy to use are the same features that generously unlock security flaws for
      by 
      Varghese, George, 1960-
      Format: 
      Excerpt: 
      specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that