Safety of computer architectures
Na minha lista:
Outros Autores: | Boulanger, Jean-Louis |
---|---|
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês francês |
Publicado em: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Assuntos: | |
Acesso em linha: | https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/178716 Ver en el OPAC |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Software architecture and design for reliability predictability /
Por: Semegn, Assefa D.
Publicado em: (2011)
Por: Semegn, Assefa D.
Publicado em: (2011)
Computer architecture
Por: Blanchet, Gerard
Publicado em: (2013)
Por: Blanchet, Gerard
Publicado em: (2013)
Journal of trust management
Publicado em: (2014)
Publicado em: (2014)
Web application defender's cookbook battling hackers and protecting users /
Por: Barnett, Ryan C.
Publicado em: (2013)
Por: Barnett, Ryan C.
Publicado em: (2013)
Quantum Science and Yijing Theory /
Por: Lu, Meoijuan, et al.
Publicado em: (2025)
Por: Lu, Meoijuan, et al.
Publicado em: (2025)
Unauthorised access physical penetration testing for IT security teams /
Por: Allsopp, Wil
Publicado em: (2009)
Por: Allsopp, Wil
Publicado em: (2009)
Mobile access safety beyond BYOD /
Por: Assing, Dominique
Publicado em: (2013)
Por: Assing, Dominique
Publicado em: (2013)
Computer systems : an introduction to computers for engineering curricula /
Por: Vila Carbó, Juan Antonio
Publicado em: (2017)
Por: Vila Carbó, Juan Antonio
Publicado em: (2017)
Secure computer and network systems modeling, analysis and design /
Por: Ye, Nong
Publicado em: (2008)
Por: Ye, Nong
Publicado em: (2008)
Artificial neural network for software reliability prediction /
Por: Bisi, Manjubala, et al.
Publicado em: (2017)
Por: Bisi, Manjubala, et al.
Publicado em: (2017)
Software error detection through testing and analysis
Por: Huang, J. C., 1935-
Publicado em: (2009)
Por: Huang, J. C., 1935-
Publicado em: (2009)
Birthing the computer : from drums to cores /
Por: Kaisler, Stephen H.
Publicado em: (2017)
Por: Kaisler, Stephen H.
Publicado em: (2017)
Software safety and security : tools for analysis and verification /
Publicado em: (2012)
Publicado em: (2012)
Using aspect-oriented programming for trustworthy software development
Por: Safonov, V. O. (Vladimir Olegovich)
Publicado em: (2008)
Por: Safonov, V. O. (Vladimir Olegovich)
Publicado em: (2008)
Safe computing for emerging economies /
Publicado em: (2018)
Publicado em: (2018)
Applications of secure multiparty computation /
Publicado em: (2015)
Publicado em: (2015)
Information security technical report
Publicado em: (1996)
Publicado em: (1996)
International journal of information security science
Windows IT security
Hashing in computer science fifty years of slicing and dicing /
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
Network forensics /
Por: Messier, Ric
Publicado em: (2017)
Por: Messier, Ric
Publicado em: (2017)
Constelación Babieca : ataques contra redes /
Por: Cot Ros, Eduard
Publicado em: (2016)
Por: Cot Ros, Eduard
Publicado em: (2016)
Cybersecurity and resilience in the arctic /
Publicado em: (2020)
Publicado em: (2020)
Virtual private networking a construction, operation and utilization guide /
Por: Held, Gilbert, 1943-
Publicado em: (2004)
Por: Held, Gilbert, 1943-
Publicado em: (2004)
Secure multi-party computation /
Publicado em: (2013)
Publicado em: (2013)
Cyber conflict competing national perspectives /
Por: Ventre, Daniel
Publicado em: (2012)
Por: Ventre, Daniel
Publicado em: (2012)
Computers & security
Publicado em: (1982)
Publicado em: (1982)
Computer forensics for dummies
Por: Volonino, Linda
Publicado em: (2008)
Por: Volonino, Linda
Publicado em: (2008)
Distributed systems security issues, processes, and solutions /
Publicado em: (2009)
Publicado em: (2009)
Selected readings in cybersecurity /
Publicado em: (2018)
Publicado em: (2018)
Engineering secure and dependable software systems /
Publicado em: (2019)
Publicado em: (2019)
Information security in education and practice /
Publicado em: (2021)
Publicado em: (2021)
Security and privacy in the internet of things : challenges and solutions /
Publicado em: (2020)
Publicado em: (2020)
Ensuring network security through the use of the honeypot technique /
Por: Selvaraj, Rajalakshmi, et al.
Publicado em: (2020)
Por: Selvaraj, Rajalakshmi, et al.
Publicado em: (2020)
Journal of computer security
Registos relacionados
-
Software architecture and design for reliability predictability /
Por: Semegn, Assefa D.
Publicado em: (2011) -
Computer architecture
Por: Blanchet, Gerard
Publicado em: (2013) -
Journal of trust management
Publicado em: (2014) -
Web application defender's cookbook battling hackers and protecting users /
Por: Barnett, Ryan C.
Publicado em: (2013) -
Quantum Science and Yijing Theory /
Por: Lu, Meoijuan, et al.
Publicado em: (2025)