Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
Library
1086 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      components that make Google so easy to use are the same features that generously unlock security flaws for
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      current subfield within computer science, with many citations, and often include new developments in the
      by 
      Snedaker, Susan.
      MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
      ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
      Format: 
      Excerpt: 
      Server Roles and Server Security; Security Templates and Software Updates; Managing Physical and Logical
      by 
      Wilson, Concepción S. (Concepción Shimizu), 1940-
      Format: 
      Excerpt: 
      benefits, gadgets, and appeal of the personal computer. * Manage applications from a central location and
      by 
      Mosher, Sue, 1953-
      Format: 
      Excerpt: 
      transmission of computer viruses, the security restrictions can also get in the way of legitimate programs, but
      by 
      Erbschloe, Michael, 1951-
      Format: 
      Excerpt: 
      morally, ethically, and legally correct path to success. Supported by author speaking tour and "Computer
      by 
      Gallo, Michael A.
      Format: 
      Excerpt: 
      convergence -- New appendix on X.25.5. -- Chapter Titles: Fundamental Concepts of Computer Networks and
      by 
      Wang, De, author.
      Format: 
      Excerpt: 
      defense in computer security, policy distillation in reinforcement learning, etc. Those tasks would
      by 
      Mayers, Adrian Merton, author.
      Format: 
      Excerpt: 
      nation-state or its proxies to acquire economic intelligence by using computer networks. Cyber economic
      by 
      Brookes, Scott, author.
      Format: 
      Excerpt: 
      One particularly difficult challenge in the computer security landscape is preventing privilege
      by 
      Zohuri, Bahman. author.
      Format: 
      Excerpt: 
      . These enterprises include financial, organizational, homeland security, and supply chain operations with