Search ResultsElectronic Resources
by
Rocha, Álvaro. editor.
Format:
Excerpt:
) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
of wireless security -- Brain-computer interfaces for the operation of robotic and prosthetic devices
by
Caputo, Anthony C.
ScienceDirect http://www.sciencedirect.com/science/book/9781856177474
Format:
Excerpt:
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security
by
Craig, Paul.
ScienceDirect https://www.sciencedirect.com/science/book/9781932266986
Format:
Excerpt:
software piracy is actually being carried out. * This book is about software piracy--what it is and how it
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
various security policies. This book would be an invaluable addition to any university course in computer
by
Tsoutsos, Nektarios Georgios, author.
Format:
Excerpt:
cause to these problems is that modern computer architectures have always been designed for performance
by
Raff, Edward, author.
Format:
Excerpt:
available to security professions are improving, but limited. Each tool is designed for one software
by
See, Timothy W., Jr., author.
Format:
Excerpt:
university computer labs. While the university labs were fully capable of running this module, Docker was
by
Rocha, Álvaro. editor.
Format:
Excerpt:
Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools
by
Rocha, Álvaro. editor.
Format:
Excerpt:
Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools
by
Rocha, Álvaro. editor.
Format:
Excerpt:
Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools
by
Sylvertooth, Randall Earl, author.
Format:
Excerpt:
cyber-attacks as any other implemented computer software application. The dissertation research study as




