Search ResultsElectronic Resources 
by
Murray, Raymond L., 1920-2011.
ScienceDirect http://www.sciencedirect.com/science/book/9780123705471
Format:
Excerpt:
radiation and terrorism, nuclear plant security, and use of nuclear techniques to detect weapons materials
by
Aghajan, Hamid K.
ScienceDirect http://www.sciencedirect.com/science/book/9780123746337
Format:
Excerpt:
engineers, computer engineers, and graduate students working in signal and video processing, computer vision
by
Saltzer, J. H., 1939-
ScienceDirect https://www.sciencedirect.com/science/book/9780123749574
Format:
Excerpt:
); virtualization (virtual machines); scheduling (disk arms); security (TLS). Numerous pseudocode fragments that
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
by
Cardwell, Kevin.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492287
Format:
Excerpt:
happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics
by
Reyes, Anthony.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491334
Format:
Excerpt:
-profile computer crime cases * Discusses the complex relationship between the public and private sector with
by
Dobran, F.
Format:
Excerpt:
VESUVIUS 2000 : toward security and prosperity under the shadow of Vesuvius / F. Dobran
by
Burnett, Mark.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490412
Format:
Excerpt:
complexity requirements. A typical computer user must remember dozens of passwords and they are told to make
by
St. Denis, Tom.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491129
Format:
Excerpt:
multiple precision algorithms. Bignum math is the backbone of modern computer security algorithms. It is
by
Long, Johnny.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836364
Format:
Excerpt:
components that make Google so easy to use are the same features that generously unlock security flaws for
by
Varghese, George, 1960-
ScienceDirect https://www.sciencedirect.com/science/book/9780120884773
Format:
Excerpt:
specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on

Select an Action





