Search ResultsElectronic Resources 
Limit Search Results
by
Obaidat, Mohammad S. (Mohammad Salameh), 1952-
ScienceDirect http://www.sciencedirect.com/science/book/9780124158443
Format:
Excerpt:
and communications Spectrum management Cognitive and autonomous radio systems Computing and
by
Speed, Tyler Justin.
Format:
Excerpt:
-wide culture of security awareness and provides step-by-step instruction on how to build an effective security
by
Heiderich, Mario.
Format:
Excerpt:
vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools
by
Hoog, Andrew.
ScienceDirect https://www.sciencedirect.com/science/book/9781597496513
Format:
Excerpt:
Software Development Kit and Android Debug Bridge Chapter 4 Android File Systems and Data Structures
by
Malepati, Hazarathaiah.
ScienceDirect https://www.sciencedirect.com/science/book/9781856176781
Format:
Excerpt:
PART I: Data Processing -- Data Security -- Data Error Correction -- Data Compression -- PART II
by
Finneran, Michael F.
ScienceDirect https://www.sciencedirect.com/science/book/9780750682992
Format:
Excerpt:
effective voice over WLAN systems. * Gives complete details on integrating voice and data services on WLANs
by
Carvey, Harlan A.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491730
Format:
Excerpt:
techniques they can use to extract information from Windows systems. This approach allows the reader to get
by
Bidgoli, Hossein.
ScienceDirect http://www.sciencedirect.com/science/book/9780120959778
Format:
Excerpt:
In Action -- Intranets and Extranets -- Electronic Data Interchange -- Electronic Payment Systems
by
Wang, Pingyang.
ScienceDirect https://www.sciencedirect.com/science/book/9780080340777
Format:
Excerpt:
. Papers pertaining to 13 areas directly related to power systems and representing state-of-the-art methods
by
Gorman, Timothy Michael, author. (orcid)0000-0003-2684-9523
Format:
Excerpt:
production -- and with it Vietnam's broader food security -- is being challenged by both climate change and
by
Oluwatimi, Oyindamola D., author.
Format:
Excerpt:
within context-aware systems to ensure the security of sensitive enterprise data. We propose several
by
Nwafor, Ebelechukwu, author.
Format:
Excerpt:
. However, privacy and security problems arise as a result of CPS connectivity, heterogeneity, and

Select an Action




