Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
62 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Stroman, James.
      Format: 
      Excerpt: 
      -- Office machines -- Telecommunications equipment -- Computer hardware -- Computer software -- Database
      by 
      Lyon, David, 1948-
      Format: 
      Excerpt: 
      "dossier society" to database networks / Greg Marquis -- From personal to digital : CCTV, the panopticon
      by 
      Lyon, David, 1948-, editor
      Format: 
      Excerpt: 
      "dossier society" to database networks / Greg Marquis -- From personal to digital : CCTV, the panopticon
      by 
      Kurniawan, Budi.
      Format: 
      Excerpt: 
      . Internationalization -- ch. 20. Applets -- ch. 21. Java networking -- ch. 22. Java database connectivity -- ch. 23
      by 
      'Ken'@ftu.
      Format: 
      Excerpt: 
      standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of
      by 
      Buckley, Karen Jean, author.
      Format: 
      Excerpt: 
      statistical and geospatial analysis made possible by the creation of a comprehensive database designed to
      by 
      Park, James J. (Jong Hyuk). editor.
      Format: 
      Excerpt: 
      Ubiquitous Systems and Applications -- 4 Ubiquitous Security, Privacy and Trust -- CSA2016 -- 1 Mobile and
      by 
      Enders, Walter, 1948-
      Format: 
      Excerpt: 
      terrorist network structures and organization, accounts for changes in the Department of Homeland Security
      by 
      Pearson, Robert L.
      Format: 
      Excerpt: 
      Security Control Center -- Chapter 11Database Management -- Chapter 12System Configuration Control
      by 
      Cochran, Jerry, 1964-
      Format: 
      Excerpt: 
      Technology; Leveraging Cluster Technologies for Exchange; Don't Overlook Security as a Powerful High
      by 
      Traxler, Julie.
      Format: 
      Excerpt: 
      these large, well-established and security-conscious web sites have problems, how can anyone be safe
      by 
      Zahay, Debra L., author.
      Format: 
      Excerpt: 
      intellectual property -- 9. The customer database and analytics -- 10. Concluding thoughts -- Appendix. Digital