Search ResultsElectronic Resources 
by
Reber, Bernard.
Format:
Excerpt:
. Electronic voting and computer security / Stephan BRUNESSAUX -- 20. Politicization of sociotechnical spaces
by
Donahoo, Michael J.
ScienceDirect https://www.sciencedirect.com/science/book/9780123745408
Format:
Excerpt:
internetworking and the exponential increase of computer processing power have enhanced the efficacy and scope of
by
Crowley, Paul.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491280
Format:
Excerpt:
CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part
by
Kovacich, Gerald L.
ScienceDirect http://www.sciencedirect.com/science/book/9780750679299
Format:
Excerpt:
professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a
by
Zhao, Wenyi.
ScienceDirect http://www.sciencedirect.com/science/book/9780120884520
Format:
Excerpt:
evolving computer technologies that will become our perfect mechanical eyes. The difficulty that confronts
by
Smith, James E. (James Edward), 1950-
MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
Format:
Excerpt:
in computer system design. They provide system security, flexibility, cross-platform compatibility
by
Keshavarzi, Parviz, author.
Format:
Excerpt:
computer networks. This thesis describes high performance techniques which speed up the modular
by
Wilkes, M. V. (Maurice Vincent)
ScienceDirect http://www.sciencedirect.com/science/book/9780080502687
Format:
Excerpt:
; Higher Order Solitons; The Practical Outlook for Solitons; References; Part V: Computer Security; Chapter
by
Chartrand, Robert Lee, 1928-2010.
ScienceDirect https://www.sciencedirect.com/science/book/9780080219790
Format:
Excerpt:
Monolith; Privacy and Information; Security and Information; Contemporary Government Information Interests
by
Rubinoff, Morris.
Format:
Excerpt:
; Chapter 1. Information Security in a Multi-User Computer Environment; 1. The Computer Security Problem; 2
by
Lobiyal, Daya K. editor.
Format:
Excerpt:
science and information security. The book aims to bring together the latest scientific research works of
by
Raman, Balasubramanian. editor.
Format:
Excerpt:
document processing are considered as applications of computer vision and image processing. They discuss

Select an Action





