Showing 1,941 - 1,960 results of 2,153 for search '"computer security"', query time: 0.26s Refine Results
  1. 1941
    Published 2012
    Table of Contents: “…Mobile and ubiquitous computing.- Dependable, reliable and autonomic computing -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 1942
    Published 2019
    Table of Contents: “… Processing and Real-Time Systems -- Computer Security -- Innovation in Computer Science Education -- Digital…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 1943
    Published 2016
    Table of Contents: “…, Social Networks and Recommendation Systems -- Part III: Web Services, Cloud Computing, Security…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 1944
    Table of Contents: “… -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 1945
  6. 1946
  7. 1947
    Published 2005
    Table of Contents: “…WSTST’05 Plenary Abstracts -- Neural Networks -- Fuzzy Systems -- Image Processing -- Computer…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 1948
    by Shovic, John C.
    Published 2016
    Table of Contents: “… and the Rasberry Pi -- Chapter 7: Computer Security and the IoT -- Appendix 1: Suggestions of Further Work.…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 1949
    Published 2013
    Table of Contents: “… and Mobile Communications -- Intelligent Computing -- Multimedia and Ubiquitous Computing Security…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 1950
    by Ruan, Xiaoyu
    Published 2014
    Full Text via HEAL-Link
    Electronic eBook
  11. 1951
  12. 1952
  13. 1953
    Published 2005
    Table of Contents: “… -- E-Business -- Computer and Sensor Hardware and Architecture -- Computer Security -- Image and Video…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 1954
  15. 1955
  16. 1956
    Published 2011
    Table of Contents: “… for Distributed Computing -- Databases -- Computer Security: Cryptographic Methods, Public Key Cryptography, RSA…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 1957
    Published 2019
    Table of Contents: “…A survey of game theoretic solutions for cloud computing security issues -- A survey of game…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 1958
    Published 2006
    Table of Contents: “…Keynote -- Power Aware Computing -- Security and Fault Tolerance 1 -- Agent and Distributed…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 1959
  20. 1960
Search Tools: RSS Feed Email Search