Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
Library
1086 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Serpanos, Dimitrios Nikolaou.
      Format: 
      Excerpt: 
      allow you to solve a broad range of problems in system design, including problems related to security
      by 
      Flick, Tony.
      Format: 
      Excerpt: 
      , Assistant Professor of Computer Security, Dakota State University. "Easy to read and full of valuable
      by 
      Reber, Bernard.
      Format: 
      Excerpt: 
      . Electronic voting and computer security / Stephan BRUNESSAUX -- 20. Politicization of sociotechnical spaces
      by 
      Donahoo, Michael J.
      Format: 
      Excerpt: 
      internetworking and the exponential increase of computer processing power have enhanced the efficacy and scope of
      by 
      Crowley, Paul.
      Format: 
      Excerpt: 
      CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part
      by 
      Zhao, Wenyi.
      Format: 
      Excerpt: 
      evolving computer technologies that will become our perfect mechanical eyes. The difficulty that confronts
      by 
      Kovacich, Gerald L.
      Format: 
      Excerpt: 
      professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a
      by 
      Smith, James E. (James Edward), 1950-
      MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
      ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
      Format: 
      Excerpt: 
      in computer system design. They provide system security, flexibility, cross-platform compatibility
      by 
      Keshavarzi, Parviz, author.
      Format: 
      Excerpt: 
      computer networks. This thesis describes high performance techniques which speed up the modular
      by 
      Wilkes, M. V. (Maurice Vincent)
      Format: 
      Excerpt: 
      ; Higher Order Solitons; The Practical Outlook for Solitons; References; Part V: Computer Security; Chapter
      by 
      Chartrand, Robert Lee, 1928-2010.
      Format: 
      Excerpt: 
      Monolith; Privacy and Information; Security and Information; Contemporary Government Information Interests
      by 
      Rubinoff, Morris.
      Format: 
      Excerpt: 
      ; Chapter 1. Information Security in a Multi-User Computer Environment; 1. The Computer Security Problem; 2