Search ResultsElectronic Resources
by
Satapathy, Suresh Chandra. editor.
Format:
Excerpt:
Systems and Data Security.
by
Wager, Karen A., 1961- author.
Format:
Excerpt:
implementation and support -- Assessing and achieving value in health care information systems -- Organizing
by
Kumar, Vijay, 1946-
Format:
Excerpt:
sensor technology, stream data processing, mobile database security, and contextual processing. Packed
by
Das, Sajal K.
Format:
Excerpt:
for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6
by
White, Jay D.
Format:
Excerpt:
Internet revolution -- Systems development and implementation -- Transforming government with technology
by
Grzenda, Maciej. editor.
Format:
Excerpt:
networks, photonic data transport networks, security policies, credentials management, data encryption for
by
Kobayashi, Shin-ya. editor.
Format:
Excerpt:
intelligence (AI), software technologies, multimedia systems, IT security and design of information systems
by
Mejia, Jezreel. editor.
Format:
Excerpt:
technology, and big data. The main topics covered include: organizational models, standards and methodologies
by
Fennelly, Lawrence J., 1940-
Format:
Excerpt:
Gigliotti and Ronald Jason -- The security survey & the security audit / Lawrence J. Fennelly -- Crime
by
Thornton, Frank.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490474
Format:
Excerpt:
the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage
by
Miller, Drew, 1978-
ScienceDirect http://www.sciencedirect.com/science/book/9781932266818
Format:
Excerpt:
stream to provide misinformation to a security system is much like performing data injection attacks to
by
IFAC Symposium (1988 : Brussels, Belgium)
ScienceDirect http://www.sciencedirect.com/science/book/9780080361352
Format:
Excerpt:
, stability analysis, data communication, expert systems and training simulators for power plants. This




