Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Library
Shelf Location
13 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Powell, Nelson Henry, III, author.
      Format: 
      Excerpt: 
      Rochester Institute of Technology. Computer Security and Information Assurance. degree granting
      by 
      Zhao, Zheng, author.
      Format: 
      Excerpt: 
      everywhere. Video surveillance system such as closed-circuit television cameras is widely used by security
      by 
      Palaniswamy, Prashanth, author.
      Format: 
      Excerpt: 
      combination of various diverse components, they are vulnerable to several security threats. Moreover, there
      by 
      Hutton, William James, III., author.
      Format: 
      Excerpt: 
      particularly vexing problem in computer security: how to improve upon the ubiquitous password for user
      by 
      Ogemuno, Emamuzo Cletus, author.
      Format: 
      Excerpt: 
      research in recent times. This is due, in part, to the increased importance of cyber-security, computer or
      by 
      Raff, Edward, author.
      Format: 
      Excerpt: 
      importance of cyber security and the prevention of malware. Beyond just the home computer, smart
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Excerpt: 
      cause to these problems is that modern computer architectures have always been designed for performance
      by 
      Wang, De, author.
      Format: 
      Excerpt: 
      defense in computer security, policy distillation in reinforcement learning, etc. Those tasks would
      by 
      Brookes, Scott, author.
      Format: 
      Excerpt: 
      One particularly difficult challenge in the computer security landscape is preventing privilege