Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Library
20 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Powell, Nelson Henry, III, author.
      Format: 
      Excerpt: 
      Rochester Institute of Technology. Computer Security and Information Assurance. degree granting
      by 
      Wright-Hamor, Cimone Le, author.
      Format: 
      Excerpt: 
      between a mobile application and a computer browser. Therefore, Ambient-Discovery provides an additional
      by 
      Zhao, Zheng, author.
      Format: 
      Excerpt: 
      everywhere. Video surveillance system such as closed-circuit television cameras is widely used by security
      by 
      Langenberg, Brandon Wade, author.
      Format: 
      Excerpt: 
      exponentially speed up some computations makes the security of todays data and items a major concern and
      by 
      Palaniswamy, Prashanth, author.
      Format: 
      Excerpt: 
      combination of various diverse components, they are vulnerable to several security threats. Moreover, there
      by 
      Hutton, William James, III., author.
      Format: 
      Excerpt: 
      particularly vexing problem in computer security: how to improve upon the ubiquitous password for user
      by 
      Ansong, Amy G., author. (orcid)0000-0002-7053-0096
      Format: 
      Excerpt: 
      aeronautical engineering, mechanical, systems (2), civil, and cyber security engineering. In total, 153 toys
      by 
      Ogemuno, Emamuzo Cletus, author.
      Format: 
      Excerpt: 
      research in recent times. This is due, in part, to the increased importance of cyber-security, computer or
      by 
      Zhang, Zhiming, author.
      Format: 
      Excerpt: 
      modification, and leak of confidential information. To address the security threats on FPGA systems, majority
      by 
      See, Timothy W., Jr., author.
      Format: 
      Excerpt: 
      university computer labs. While the university labs were fully capable of running this module, Docker was
      by 
      Raff, Edward, author.
      Format: 
      Excerpt: 
      importance of cyber security and the prevention of malware. Beyond just the home computer, smart