Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
114 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Wager, Karen A., 1961- author.
      Format: 
      Excerpt: 
      implementation and support -- Assessing and achieving value in health care information systems -- Organizing
      by 
      Kumar, Vijay, 1946-
      Format: 
      Excerpt: 
      sensor technology, stream data processing, mobile database security, and contextual processing. Packed
      by 
      Das, Sajal K.
      Format: 
      Excerpt: 
      for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6
      by 
      White, Jay D.
      Format: 
      Excerpt: 
      Internet revolution -- Systems development and implementation -- Transforming government with technology
      by 
      Grzenda, Maciej. editor.
      Format: 
      Excerpt: 
      networks, photonic data transport networks, security policies, credentials management, data encryption for
      by 
      Kobayashi, Shin-ya. editor.
      Format: 
      Excerpt: 
      intelligence (AI), software technologies, multimedia systems, IT security and design of information systems
      by 
      Mejia, Jezreel. editor.
      Format: 
      Excerpt: 
      technology, and big data. The main topics covered include: organizational models, standards and methodologies
      by 
      Fennelly, Lawrence J., 1940-
      Format: 
      Excerpt: 
      Gigliotti and Ronald Jason -- The security survey & the security audit / Lawrence J. Fennelly -- Crime
      by 
      Thornton, Frank.
      Format: 
      Excerpt: 
      the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage
      by 
      Miller, Drew, 1978-
      Format: 
      Excerpt: 
      stream to provide misinformation to a security system is much like performing data injection attacks to
      by 
      IFAC Symposium (1988 : Brussels, Belgium)
      Format: 
      Excerpt: 
      , stability analysis, data communication, expert systems and training simulators for power plants. This