Showing 1,921 - 1,940 results of 2,153 for search '"Computer security"', query time: 0.12s Refine Results
  1. 1921
    by Di Cataldo, Giuseppe
    Published 2016
    Full Text via HEAL-Link
    Electronic eBook
  2. 1922
  3. 1923
    Published 2018
    Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 1924
    Published 2018
    Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 1925
    Published 2018
    Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 1926
    Published 2018
    Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 1927
    Published 2012
    Table of Contents: “…Intelligent transport -- Environmental engineering -- Computer security -- Civil engineering…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 1928
    Published 2004
    Table of Contents: “… -- IX Biomedical Applications -- X Detection, Diagnostics, and Computer Security -- XI Other…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 1929
    Table of Contents: “…Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 1930
    Published 2017
    Table of Contents: “… -- Modelling and optimization -- Various aspects of computer security.…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 1931
    Published 2016
    Table of Contents: “…Computer Security: Information security, Network Security, Cloud Security, Mobile Security…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 1932
    by Srinivasan, S.
    Published 2014
    Table of Contents: “… Computing Providers -- Cloud Computing Security -- Assessing Cloud Computing for Business Use -- Hidden…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 1933
    Published 2016
    Table of Contents: “… -- Knowledge-Based Technologies for Web Applications, Cloud Computing, Security, Algorithms and Computer…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 1934
    Published 2012
    Table of Contents: “…Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 1935
    by Stallings, William
    Published 2016
    Book
  16. 1936
  17. 1937
    Published 2010
    Table of Contents: “… to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 1938
    Published 2015
    Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 1939
    Published 2014
    Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 1940
    Published 2012
    Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search