Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
114 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Pal, Sankar K.
      Format: 
      Excerpt: 
      to off-line multimedia analysis systems related to security and safety, thus entailing disciplines
      by 
      Menache, Alberto, 1961-
      Format: 
      Excerpt: 
      , medicine, sports, and security engineering. This completely updated new edition tells the complete story of
      by 
      Gragido, Will.
      Format: 
      Excerpt: 
      competitor or the international black markets, to compromise financial data and systems, or undermine the
      by 
      Sistare, Hannah S.
      Format: 
      Excerpt: 
      fellows and staff -- Using data-driven human capital decisions to improve basic personnel functions
      by 
      Murray, Raymond L., 1920-2011.
      Format: 
      Excerpt: 
      Radiation and Materials ; 6Fission ; 7Fusion -- Part II NUCLEAR SYSTEMS. 8Particle Accelerators ; 9Isotope
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      are common across operating systems, networks, database systems, distributed systems, programming
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      : Data Hiding Tactics for Windows and Unix File Systems; 2. Digital Storage and File Systems; 4
      by 
      Alder, Raven.
      Format: 
      Excerpt: 
      -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting
      by 
      Wiles, Jack.
      Format: 
      Excerpt: 
      Around the world, SCADA (supervisory control and data acquisition) systems and other real
      by 
      XYPRO Technology Corporation.
      Format: 
      Excerpt: 
      essential for companies to become proactive in implementing effective system and data security measures
      by 
      Vacca, John R.
      Format: 
      Excerpt: 
      policy to protect your organization's systems and data Reduce your susceptibility to an attack by
      by 
      Rittinghouse, John W.
      Format: 
      Excerpt: 
      enforcement communities. He has a Ph. D. in information systems specializing in information security and is a