Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
114 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Stapko, Timothy John.
      Format: 
      Excerpt: 
      whose predations have plagued traditional systems for years. Rising concerns about data security in
      by 
      Cross, Michael, 1965-
      Format: 
      Excerpt: 
      perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have
      by 
      Garg, Vijay Kumar, 1938-
      Format: 
      Excerpt: 
      , security, cellular network planning, and 4G systems. A unique feature of this book that is missing in most
      by 
      Carroll, John M. (John Millar), 1925-
      Format: 
      Excerpt: 
      prevention of attacks on computer systems and data being compromised. The book is divided into five parts
      by 
      Tsichritzis, Dionysios C.
      Format: 
      Excerpt: 
      System; 6.5 Access Methods; 6.6 Data Base Management Systems; 6.7 Example of a Simple File System; 6.8
      by 
      Lobiyal, Daya K. editor.
      Format: 
      Excerpt: 
      Analysis -- Chapter 14. Efficient Storage and Processing of Video Data for Moving Object Detection Using
      by 
      Ayar, Muharrem, author.
      Format: 
      Excerpt: 
      communication systems limits the capacity of the control systems and introduce uncertainty to the system. On the
      by 
      Colling, Russell L.
      Format: 
      Excerpt: 
      information to a new and broader audience. FEATURES AND BENEFITS: * Practical support for healthcare security
      by 
      Wright, Craig.
      Format: 
      Excerpt: 
      Checklists; Appendix E -- Data Classification; Appendix F -- Data Retention; Appendix G -- Backup and
      by 
      Kanclirz, Jan.
      Format: 
      Excerpt: 
      Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set