Search ResultsElectronic Resources 
by
Miller, Bruce, author.
Format:
Excerpt:
employed in the US who use a computer and are aware of a security policy. Individual and aggregate factor
by
Tsoutsos, Nektarios Georgios, author.
Format:
Excerpt:
cause to these problems is that modern computer architectures have always been designed for performance
by
Sylvertooth, Randall Earl, author.
Format:
Excerpt:
verified program system functions or a computer security architecture during its performance. Therefore
by
Bandekar, Ashutosh, author.
Format:
Excerpt:
or access IoT devices remotely using smartphone or a computer, any attack on these devices can result
by
Wang, De, author.
Format:
Excerpt:
defense in computer security, policy distillation in reinforcement learning, etc. Those tasks would
by
Mayers, Adrian Merton, author.
Format:
Excerpt:
nation-state or its proxies to acquire economic intelligence by using computer networks. Cyber economic
by
Brookes, Scott, author.
Format:
Excerpt:
One particularly difficult challenge in the computer security landscape is preventing privilege
by
Keshavarzi, Parviz, author.
Format:
Excerpt:
computer networks. This thesis describes high performance techniques which speed up the modular

Select an Action





