Search ResultsElectronic Resources 
Limit Search Results
by
Stapko, Timothy John.
ScienceDirect https://www.sciencedirect.com/science/book/9780750682152
Format:
Excerpt:
whose predations have plagued traditional systems for years. Rising concerns about data security in
by
Cross, Michael, 1965-
ScienceDirect https://www.sciencedirect.com/science/book/9781597492768
Format:
Excerpt:
perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have
by
Garg, Vijay Kumar, 1938-
ScienceDirect https://www.sciencedirect.com/science/book/9780123735805
Format:
Excerpt:
, security, cellular network planning, and 4G systems. A unique feature of this book that is missing in most
by
Jamaluddin, Ismail bin, author.
Format:
Excerpt:
processes, use of information technology and incentive systems of the privatised port operators. Employees
by
Carroll, John M. (John Millar), 1925-
ScienceDirect https://www.sciencedirect.com/science/book/9780409900323
Format:
Excerpt:
prevention of attacks on computer systems and data being compromised. The book is divided into five parts
by
Tsichritzis, Dionysios C.
ScienceDirect https://www.sciencedirect.com/science/book/9780127017501
Format:
Excerpt:
System; 6.5 Access Methods; 6.6 Data Base Management Systems; 6.7 Example of a Simple File System; 6.8
by
Wang, An, author.
Format:
Excerpt:
most important functionality for most security services is the global visibility of network data and
by
Lobiyal, Daya K. editor.
Format:
Excerpt:
Analysis -- Chapter 14. Efficient Storage and Processing of Video Data for Moving Object Detection Using
by
Ayar, Muharrem, author.
Format:
Excerpt:
communication systems limits the capacity of the control systems and introduce uncertainty to the system. On the
by
Colling, Russell L.
Format:
Excerpt:
information to a new and broader audience. FEATURES AND BENEFITS: * Practical support for healthcare security
by
Wright, Craig.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492669
Format:
Excerpt:
Checklists; Appendix E -- Data Classification; Appendix F -- Data Retention; Appendix G -- Backup and
by
Kanclirz, Jan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492577
Format:
Excerpt:
Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set

Select an Action




