Safety of computer architectures
Enregistré dans:
Autres auteurs: | Boulanger, Jean-Louis |
---|---|
Format: | Électronique eBook |
Langue: | anglais français |
Publié: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Sujets: | |
Accès en ligne: | https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/178716 Voir à l'OPAC |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Software architecture and design for reliability predictability /
par: Semegn, Assefa D.
Publié: (2011)
par: Semegn, Assefa D.
Publié: (2011)
Computer architecture
par: Blanchet, Gerard
Publié: (2013)
par: Blanchet, Gerard
Publié: (2013)
Journal of trust management
Publié: (2014)
Publié: (2014)
Web application defender's cookbook battling hackers and protecting users /
par: Barnett, Ryan C.
Publié: (2013)
par: Barnett, Ryan C.
Publié: (2013)
Quantum Science and Yijing Theory /
par: Lu, Meoijuan, et autres
Publié: (2025)
par: Lu, Meoijuan, et autres
Publié: (2025)
Unauthorised access physical penetration testing for IT security teams /
par: Allsopp, Wil
Publié: (2009)
par: Allsopp, Wil
Publié: (2009)
Mobile access safety beyond BYOD /
par: Assing, Dominique
Publié: (2013)
par: Assing, Dominique
Publié: (2013)
Computer systems : an introduction to computers for engineering curricula /
par: Vila Carbó, Juan Antonio
Publié: (2017)
par: Vila Carbó, Juan Antonio
Publié: (2017)
Secure computer and network systems modeling, analysis and design /
par: Ye, Nong
Publié: (2008)
par: Ye, Nong
Publié: (2008)
Artificial neural network for software reliability prediction /
par: Bisi, Manjubala, et autres
Publié: (2017)
par: Bisi, Manjubala, et autres
Publié: (2017)
Software error detection through testing and analysis
par: Huang, J. C., 1935-
Publié: (2009)
par: Huang, J. C., 1935-
Publié: (2009)
Birthing the computer : from drums to cores /
par: Kaisler, Stephen H.
Publié: (2017)
par: Kaisler, Stephen H.
Publié: (2017)
Software safety and security : tools for analysis and verification /
Publié: (2012)
Publié: (2012)
Using aspect-oriented programming for trustworthy software development
par: Safonov, V. O. (Vladimir Olegovich)
Publié: (2008)
par: Safonov, V. O. (Vladimir Olegovich)
Publié: (2008)
Safe computing for emerging economies /
Publié: (2018)
Publié: (2018)
Applications of secure multiparty computation /
Publié: (2015)
Publié: (2015)
Information security technical report
Publié: (1996)
Publié: (1996)
International journal of information security science
Windows IT security
Hashing in computer science fifty years of slicing and dicing /
par: Konheim, Alan G., 1934-
Publié: (2010)
par: Konheim, Alan G., 1934-
Publié: (2010)
Cyber security and resiliency policy framework /
Publié: (2014)
Publié: (2014)
Network forensics /
par: Messier, Ric
Publié: (2017)
par: Messier, Ric
Publié: (2017)
Constelación Babieca : ataques contra redes /
par: Cot Ros, Eduard
Publié: (2016)
par: Cot Ros, Eduard
Publié: (2016)
Cybersecurity and resilience in the arctic /
Publié: (2020)
Publié: (2020)
Virtual private networking a construction, operation and utilization guide /
par: Held, Gilbert, 1943-
Publié: (2004)
par: Held, Gilbert, 1943-
Publié: (2004)
Secure multi-party computation /
Publié: (2013)
Publié: (2013)
Cyber conflict competing national perspectives /
par: Ventre, Daniel
Publié: (2012)
par: Ventre, Daniel
Publié: (2012)
Computers & security
Publié: (1982)
Publié: (1982)
Computer forensics for dummies
par: Volonino, Linda
Publié: (2008)
par: Volonino, Linda
Publié: (2008)
Distributed systems security issues, processes, and solutions /
Publié: (2009)
Publié: (2009)
Selected readings in cybersecurity /
Publié: (2018)
Publié: (2018)
Engineering secure and dependable software systems /
Publié: (2019)
Publié: (2019)
Information security in education and practice /
Publié: (2021)
Publié: (2021)
Security and privacy in the internet of things : challenges and solutions /
Publié: (2020)
Publié: (2020)
Ensuring network security through the use of the honeypot technique /
par: Selvaraj, Rajalakshmi, et autres
Publié: (2020)
par: Selvaraj, Rajalakshmi, et autres
Publié: (2020)
Journal of computer security
Documents similaires
-
Software architecture and design for reliability predictability /
par: Semegn, Assefa D.
Publié: (2011) -
Computer architecture
par: Blanchet, Gerard
Publié: (2013) -
Journal of trust management
Publié: (2014) -
Web application defender's cookbook battling hackers and protecting users /
par: Barnett, Ryan C.
Publié: (2013) -
Quantum Science and Yijing Theory /
par: Lu, Meoijuan, et autres
Publié: (2025)