Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Library
20 Results Found Subscribe to search results
00000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      See, Timothy W., Jr., author.
      Format: 
      Excerpt: 
      university computer labs. While the university labs were fully capable of running this module, Docker was
      by 
      Raff, Edward, author.
      Format: 
      Excerpt: 
      importance of cyber security and the prevention of malware. Beyond just the home computer, smart
      by 
      Mayers, Adrian Merton, author.
      Format: 
      Excerpt: 
      nation-state or its proxies to acquire economic intelligence by using computer networks. Cyber economic
      by 
      Wang, De, author.
      Format: 
      Excerpt: 
      defense in computer security, policy distillation in reinforcement learning, etc. Those tasks would
      by 
      Brookes, Scott, author.
      Format: 
      Excerpt: 
      One particularly difficult challenge in the computer security landscape is preventing privilege
      by 
      Keshavarzi, Parviz, author.
      Format: 
      Excerpt: 
      computer networks. This thesis describes high performance techniques which speed up the modular