Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
1085 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Langenberg, Brandon Wade, author.
      Format: 
      Excerpt: 
      exponentially speed up some computations makes the security of todays data and items a major concern and
      by 
      Wright-Hamor, Cimone Le, author.
      Format: 
      Excerpt: 
      between a mobile application and a computer browser. Therefore, Ambient-Discovery provides an additional
      by 
      Palaniswamy, Prashanth, author.
      Format: 
      Excerpt: 
      combination of various diverse components, they are vulnerable to several security threats. Moreover, there
      by 
      Zhao, Zheng, author.
      Format: 
      Excerpt: 
      everywhere. Video surveillance system such as closed-circuit television cameras is widely used by security
      by 
      Rocha, Álvaro. editor.
      Format: 
      Excerpt: 
      experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I
      by 
      Hosseinian-Far, Amin. editor.
      Format: 
      Excerpt: 
      assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design
      by 
      Bhatia, Sanjiv K. editor.
      Format: 
      Excerpt: 
      computing, security and many more. This book helps the perspective readers’ from computer industry and
      by 
      Ackermann, Tobias. author.
      Format: 
      Excerpt: 
      . Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives
      by 
      McGrayne, Sharon Bertsch.
      Format: 
      Excerpt: 
      -the-shelf computer technology in the 1980s proved to be a game-changer. Today, Bayes' rule is used everywhere from
      by 
      Caputo, Anthony C.
      Format: 
      Excerpt: 
      Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security
      by 
      George, Roger Z., 1949-
      Format: 
      Excerpt: 
      scientific method / Timothy J. Smith -- Homeland Security intelligence: rationale, requirements, and current
      by 
      Chandra, Praphul.
      Format: 
      Excerpt: 
      telephone and computer infrastructure this technology can be implemented at low cost *The importance of