Search ResultsElectronic Resources 
by
Powell, Nelson Henry, III, author.
Format:
Excerpt:
Rochester Institute of Technology. Computer Security and Information Assurance. degree granting
by
Wright-Hamor, Cimone Le, author.
Format:
Excerpt:
between a mobile application and a computer browser. Therefore, Ambient-Discovery provides an additional
by
Zhao, Zheng, author.
Format:
Excerpt:
everywhere. Video surveillance system such as closed-circuit television cameras is widely used by security
by
Langenberg, Brandon Wade, author.
Format:
Excerpt:
exponentially speed up some computations makes the security of todays data and items a major concern and
by
Palaniswamy, Prashanth, author.
Format:
Excerpt:
combination of various diverse components, they are vulnerable to several security threats. Moreover, there
by
Hutton, William James, III., author.
Format:
Excerpt:
particularly vexing problem in computer security: how to improve upon the ubiquitous password for user
by
Ansong, Amy G., author. (orcid)0000-0002-7053-0096
Format:
Excerpt:
aeronautical engineering, mechanical, systems (2), civil, and cyber security engineering. In total, 153 toys
by
Ogemuno, Emamuzo Cletus, author.
Format:
Excerpt:
research in recent times. This is due, in part, to the increased importance of cyber-security, computer or
by
Burney, Micaela L., author.
Format:
Excerpt:
techniques, the current status in the computer age, and how it relates this to forensic, security, and legal
by
Zhang, Zhiming, author.
Format:
Excerpt:
modification, and leak of confidential information. To address the security threats on FPGA systems, majority
by
See, Timothy W., Jr., author.
Format:
Excerpt:
university computer labs. While the university labs were fully capable of running this module, Docker was
by
Raff, Edward, author.
Format:
Excerpt:
importance of cyber security and the prevention of malware. Beyond just the home computer, smart

Select an Action





