Search ResultsElectronic Resources 
by
Langenberg, Brandon Wade, author.
Format:
Excerpt:
exponentially speed up some computations makes the security of todays data and items a major concern and
by
Wright-Hamor, Cimone Le, author.
Format:
Excerpt:
between a mobile application and a computer browser. Therefore, Ambient-Discovery provides an additional
by
Palaniswamy, Prashanth, author.
Format:
Excerpt:
combination of various diverse components, they are vulnerable to several security threats. Moreover, there
by
Zhao, Zheng, author.
Format:
Excerpt:
everywhere. Video surveillance system such as closed-circuit television cameras is widely used by security
by
Rocha, Álvaro. editor.
Format:
Excerpt:
experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I
by
Hosseinian-Far, Amin. editor.
Format:
Excerpt:
assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design
by
Bhatia, Sanjiv K. editor.
Format:
Excerpt:
computing, security and many more. This book helps the perspective readers’ from computer industry and
by
Ackermann, Tobias. author.
Format:
Excerpt:
. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives
by
McGrayne, Sharon Bertsch.
Format:
Excerpt:
-the-shelf computer technology in the 1980s proved to be a game-changer. Today, Bayes' rule is used everywhere from
by
Caputo, Anthony C.
ScienceDirect http://www.sciencedirect.com/science/book/9781856177474
Format:
Excerpt:
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security
by
George, Roger Z., 1949-
Format:
Excerpt:
scientific method / Timothy J. Smith -- Homeland Security intelligence: rationale, requirements, and current
by
Chandra, Praphul.
ScienceDirect http://www.sciencedirect.com/science/book/9780750679718
Format:
Excerpt:
telephone and computer infrastructure this technology can be implemented at low cost *The importance of

Select an Action





