Search ResultsElectronic Resources
Limit Search Results
Material Type
Language
Publication Date
-
Library
Shelf Location
Switch to list view
Switch to thumbnail view
12 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Lin, Chung-Wei. author.
      Format: 
      Excerpt: 
      develops a systematic approach to address security at early design stages together with all other design
      by 
      Clark, Champ, III.
      Format: 
      Excerpt: 
      system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster
      by 
      Amini, Rob.
      Format: 
      Excerpt: 
      , services, and protocols to meet an organization's security needs.<br /><br />* The Perfect Guide if "System
      by 
      Alsmadi, Izzat M. editor.
      Format: 
      Excerpt: 
      wireless sensor networks & their applications, and emerging trends in security system design using the
      by 
      Mishra, Prabhat. editor.
      Format: 
      Excerpt: 
      vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      Shopping -- Design and Performance of Resonant Spacing Linear Patch Array with Quarter wave transformer
      by 
      Qian, Yi, 1962-
      Format: 
      Excerpt: 
      SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for
      by 
      Hunter, Laura E.
      Format: 
      Excerpt: 
      contains step-by-step instructions on how to Design, implement and leverage the Symantec Suite of products
      by 
      Stefanek, George L.
      Format: 
      Excerpt: 
      Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security
      by 
      Perla, Enrico.
      Format: 
      Excerpt: 
      defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      : Anomaly Network Intrusion Detection System Using Hierarchical Clustering Technique -- Chapter 15. Semantic
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC
      Go to:Search Results
      |
      Search Facets
      |
      Top of Page