Search ResultsElectronic Resources 
Limit Search Results
by
Long, Johnny.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836364
Format:
Excerpt:
components that make Google so easy to use are the same features that generously unlock security flaws for
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
current subfield within computer science, with many citations, and often include new developments in the
by
Snedaker, Susan.
MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
Format:
Excerpt:
Server Roles and Server Security; Security Templates and Software Updates; Managing Physical and Logical
by
Wilson, Concepción S. (Concepción Shimizu), 1940-
ScienceDirect http://www.sciencedirect.com/science/book/9781932266504
Format:
Excerpt:
benefits, gadgets, and appeal of the personal computer. * Manage applications from a central location and
by
Mosher, Sue, 1953-
ScienceDirect http://www.sciencedirect.com/science/book/9781555582869
Format:
Excerpt:
transmission of computer viruses, the security restrictions can also get in the way of legitimate programs, but
by
Erbschloe, Michael, 1951-
ScienceDirect http://www.sciencedirect.com/science/book/9781555582906
Format:
Excerpt:
morally, ethically, and legally correct path to success. Supported by author speaking tour and "Computer
by
Gallo, Michael A.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582524
Format:
Excerpt:
convergence -- New appendix on X.25.5. -- Chapter Titles: Fundamental Concepts of Computer Networks and
by
Wang, De, author.
Format:
Excerpt:
defense in computer security, policy distillation in reinforcement learning, etc. Those tasks would
by
Mayers, Adrian Merton, author.
Format:
Excerpt:
nation-state or its proxies to acquire economic intelligence by using computer networks. Cyber economic
by
Brookes, Scott, author.
Format:
Excerpt:
One particularly difficult challenge in the computer security landscape is preventing privilege
by
Zohuri, Bahman. author.
Format:
Excerpt:
. These enterprises include financial, organizational, homeland security, and supply chain operations with

Select an Action




