Search ResultsElectronic Resources
by
Giwah, Anthony Duke, author.
Format:
Excerpt:
Empirical Assessment of Mobile Device Users' Information Security Behavior Towards Data Breach
by
Ahmed, Faraz, author.
Format:
Excerpt:
Performance Analysis and Privacy Protection of Network Data / Ahmed, Faraz, author.
by
Gemignani, Michael C. Legal protection of software.
Format:
Excerpt:
Legal protection of software: a survey / M.C. Gemignani --Algorithms for public key cryptosystems
by
Noutoua, Jean Sylvestre, author.
Format:
Excerpt:
-attacks and data breaches because of the high value data that they host. Social security numbers, credit card
by
Yovits, M. C. (Marshall Clinton)
Format:
Excerpt:
Team Size on Effort: COPMO; 9. Early Size Prediction; 10. Conclusion; Appendix. Description of Data
by
Lazakidou, Athina A.
Format:
Excerpt:
National Identity Creation in Virtual Communities and Social Media -- E-Government and Data Protection in





