Safety of computer architectures
Saved in:
Other Authors: | Boulanger, Jean-Louis |
---|---|
Format: | Electronic eBook |
Language: | English French |
Published: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Subjects: | |
Online Access: | https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/178716 View in OPAC |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Software architecture and design for reliability predictability /
by: Semegn, Assefa D.
Published: (2011)
by: Semegn, Assefa D.
Published: (2011)
Computer architecture
by: Blanchet, Gerard
Published: (2013)
by: Blanchet, Gerard
Published: (2013)
Journal of trust management
Published: (2014)
Published: (2014)
Web application defender's cookbook battling hackers and protecting users /
by: Barnett, Ryan C.
Published: (2013)
by: Barnett, Ryan C.
Published: (2013)
Quantum Science and Yijing Theory /
by: Lu, Meoijuan, et al.
Published: (2025)
by: Lu, Meoijuan, et al.
Published: (2025)
Unauthorised access physical penetration testing for IT security teams /
by: Allsopp, Wil
Published: (2009)
by: Allsopp, Wil
Published: (2009)
Mobile access safety beyond BYOD /
by: Assing, Dominique
Published: (2013)
by: Assing, Dominique
Published: (2013)
Computer systems : an introduction to computers for engineering curricula /
by: Vila Carbó, Juan Antonio
Published: (2017)
by: Vila Carbó, Juan Antonio
Published: (2017)
Secure computer and network systems modeling, analysis and design /
by: Ye, Nong
Published: (2008)
by: Ye, Nong
Published: (2008)
Artificial neural network for software reliability prediction /
by: Bisi, Manjubala, et al.
Published: (2017)
by: Bisi, Manjubala, et al.
Published: (2017)
Software error detection through testing and analysis
by: Huang, J. C., 1935-
Published: (2009)
by: Huang, J. C., 1935-
Published: (2009)
Birthing the computer : from drums to cores /
by: Kaisler, Stephen H.
Published: (2017)
by: Kaisler, Stephen H.
Published: (2017)
Software safety and security : tools for analysis and verification /
Published: (2012)
Published: (2012)
Using aspect-oriented programming for trustworthy software development
by: Safonov, V. O. (Vladimir Olegovich)
Published: (2008)
by: Safonov, V. O. (Vladimir Olegovich)
Published: (2008)
Safe computing for emerging economies /
Published: (2018)
Published: (2018)
Applications of secure multiparty computation /
Published: (2015)
Published: (2015)
Information security technical report
Published: (1996)
Published: (1996)
International journal of information security science
Windows IT security
Hashing in computer science fifty years of slicing and dicing /
by: Konheim, Alan G., 1934-
Published: (2010)
by: Konheim, Alan G., 1934-
Published: (2010)
Cyber security and resiliency policy framework /
Published: (2014)
Published: (2014)
Network forensics /
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Constelación Babieca : ataques contra redes /
by: Cot Ros, Eduard
Published: (2016)
by: Cot Ros, Eduard
Published: (2016)
Cybersecurity and resilience in the arctic /
Published: (2020)
Published: (2020)
Virtual private networking a construction, operation and utilization guide /
by: Held, Gilbert, 1943-
Published: (2004)
by: Held, Gilbert, 1943-
Published: (2004)
Secure multi-party computation /
Published: (2013)
Published: (2013)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Computers & security
Published: (1982)
Published: (1982)
Computer forensics for dummies
by: Volonino, Linda
Published: (2008)
by: Volonino, Linda
Published: (2008)
Distributed systems security issues, processes, and solutions /
Published: (2009)
Published: (2009)
Selected readings in cybersecurity /
Published: (2018)
Published: (2018)
Engineering secure and dependable software systems /
Published: (2019)
Published: (2019)
Information security in education and practice /
Published: (2021)
Published: (2021)
Security and privacy in the internet of things : challenges and solutions /
Published: (2020)
Published: (2020)
Ensuring network security through the use of the honeypot technique /
by: Selvaraj, Rajalakshmi, et al.
Published: (2020)
by: Selvaraj, Rajalakshmi, et al.
Published: (2020)
Journal of computer security
Similar Items
-
Software architecture and design for reliability predictability /
by: Semegn, Assefa D.
Published: (2011) -
Computer architecture
by: Blanchet, Gerard
Published: (2013) -
Journal of trust management
Published: (2014) -
Web application defender's cookbook battling hackers and protecting users /
by: Barnett, Ryan C.
Published: (2013) -
Quantum Science and Yijing Theory /
by: Lu, Meoijuan, et al.
Published: (2025)