Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
1084 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Murray, Raymond L., 1920-2011.
      Format: 
      Excerpt: 
      radiation and terrorism, nuclear plant security, and use of nuclear techniques to detect weapons materials
      by 
      Aghajan, Hamid K.
      Format: 
      Excerpt: 
      engineers, computer engineers, and graduate students working in signal and video processing, computer vision
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      ); virtualization (virtual machines); scheduling (disk arms); security (TLS). Numerous pseudocode fragments that
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
      by 
      Cardwell, Kevin.
      Format: 
      Excerpt: 
      happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics
      by 
      Reyes, Anthony.
      Format: 
      Excerpt: 
      -profile computer crime cases * Discusses the complex relationship between the public and private sector with
      by 
      Burnett, Mark.
      Format: 
      Excerpt: 
      complexity requirements. A typical computer user must remember dozens of passwords and they are told to make
      by 
      St. Denis, Tom.
      Format: 
      Excerpt: 
      multiple precision algorithms. Bignum math is the backbone of modern computer security algorithms. It is
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      components that make Google so easy to use are the same features that generously unlock security flaws for
      by 
      Varghese, George, 1960-
      Format: 
      Excerpt: 
      specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on