Search ResultsElektronik Kaynaklar 
Arama Sonuçlarını Sınırlandır
by
Maillet, Joseph, author.
Format:
Alıntı:
obtaining access to their victims' computers to mine cryptocurrency. Russia has evolved from website
by
Zelkowitz, Marvin V., 1945-
Format:
Alıntı:
Endsystems; Chapter 2. Heterogeneous Data Access in a Mobile Environment-Issues and Solutions; Chapter 3. The
by
Zelkowitz, Marvin V., 1945-
Format:
Alıntı:
. Control of Information Distribution and Access; 1. Introduction.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492805
Format:
Alıntı:
intelligent rules and policies creation to increase control and protection over networking functions, allowing
by
Carroll, John M. (John Millar), 1925-
ScienceDirect https://www.sciencedirect.com/science/book/9780409900323
Format:
Alıntı:
the physical security involved and access control involved in data protection. Part IV deals with the
by
Rubinoff, Morris.
Format:
Alıntı:
. Techniques of System Access Control; 3. Computer Characteristics Supporting Information Security; 4

Eylem Seç




