Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Subject
Library
36 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Thornton, Frank.
      Format: 
      Excerpt: 
      the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage
      by 
      Miller, Drew, 1978-
      Format: 
      Excerpt: 
      stream to provide misinformation to a security system is much like performing data injection attacks to
      by 
      IFAC Symposium (1988 : Brussels, Belgium)
      Format: 
      Excerpt: 
      , stability analysis, data communication, expert systems and training simulators for power plants. This
      by 
      Hoog, Andrew.
      Format: 
      Excerpt: 
      Software Development Kit and Android Debug Bridge Chapter 4 Android File Systems and Data Structures
      by 
      Malepati, Hazarathaiah.
      Format: 
      Excerpt: 
      PART I: Data Processing -- Data Security -- Data Error Correction -- Data Compression -- PART II
      by 
      Finneran, Michael F.
      Format: 
      Excerpt: 
      effective voice over WLAN systems. * Gives complete details on integrating voice and data services on WLANs
      by 
      Carvey, Harlan A.
      Format: 
      Excerpt: 
      techniques they can use to extract information from Windows systems. This approach allows the reader to get
      by 
      Bidgoli, Hossein.
      Format: 
      Excerpt: 
      In Action -- Intranets and Extranets -- Electronic Data Interchange -- Electronic Payment Systems
      by 
      Wang, Pingyang.
      Format: 
      Excerpt: 
      . Papers pertaining to 13 areas directly related to power systems and representing state-of-the-art methods
      by 
      Menache, Alberto, 1961-
      Format: 
      Excerpt: 
      , medicine, sports, and security engineering. This completely updated new edition tells the complete story of
      by 
      Gragido, Will.
      Format: 
      Excerpt: 
      competitor or the international black markets, to compromise financial data and systems, or undermine the
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      are common across operating systems, networks, database systems, distributed systems, programming