1
|
|
Creators:
|
Pruteanu Adrian
|
Collection:
|
EBSCO
|
Subjects:
|
Penetration testing (Computer security); Computer security.; Computers — Access control.; Computer networks — Security measures.; Hacking.; COMPUTERS / Security / Networking.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1085235984
|
pdf, 11.2 Mb
|
|
2
|
|
Creators:
|
Halder Soma
|
Other creators:
|
Ozdemir Sinan
|
Collection:
|
EBSCO
|
Subjects:
|
Computer security.; Machine learning.; COMPUTERS / Security / General
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1083721656
|
pdf, 11.1 Mb
|
|
3
|
|
Other creators:
|
Zaman Noor; Shah Imdad Ali; Rajper Samina
|
Collection:
|
EBSCO
|
Subjects:
|
Internet in public administration — Security measures.; Computer security.; Computer Security; Internet dans l'administration publique — Sécurité — Mesures.; Sécurité informatique.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1296949351
|
pdf, 8.7 Mb
|
|
4
|
|
Creators:
|
Bravo Cesar.; Kitchen Darren.
|
Collection:
|
EBSCO
|
Subjects:
|
Computer security.; Information technology — Security measures.; Computer Security; Sécurité informatique.; Technologie de l'information — Sécurité — Mesures.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1283849360
|
pdf, 32 Mb
|
|
5
|
|
Creators:
|
Arora Payal
|
Collection:
|
EBSCO
|
Subjects:
|
Internet users; Internet and the poor; Internet — Social aspects; Computer security; PSYCHOLOGY — Social Psychology.; Computer security.; Internet and the poor.; Internet — Social aspects.; Internet users.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1082259853
|
pdf, 9.4 Mb
|
|
6
|
|
Other creators:
|
Felderer Michael; Scandariato Riccardo
|
Collection:
|
EBSCO
|
Subjects:
|
Computer security.; Software architecture — Security measures.; Software engineering — Security measures.; COMPUTERS / Security / General.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1083341873
|
pdf, 17.4 Mb
|
|
7
|
|
Other creators:
|
Geetha S.,; Phamila Asnath Victy
|
Collection:
|
EBSCO
|
Subjects:
|
Computer networks — Security measures.; Computer crimes — Prevention.; Computer security.; COMPUTERS / Security / General.; COMPUTERS / Security / Networking.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1083671417
|
pdf, 10.0 Mb
|
|
8
|
|
Creators:
|
Donaldson Scott E.,
|
Other creators:
|
Williams Chris K.,; Siegel Stanley G.,
|
Collection:
|
EBSCO
|
Subjects:
|
Computer security.; Computer networks — Security measures.; COMPUTERS / Security / General.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1090817658
|
pdf, 2.1 Mb
|
|
9
|
|
Creators:
|
Hsu Tony Hsiang-Chih.
|
Collection:
|
EBSCO
|
Subjects:
|
Computer security.; Computer software — Development.
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1086130714
|
pdf, 12.7 Mb
|
|
10
|
|
Other creators:
|
Lobo Victor; Correia Anacleto
|
Collection:
|
EBSCO
|
Subjects:
|
Computer networks — Security measures — Data processing.; Computer security.; Deep learning (Machine learning)
|
Document type:
|
Other
|
File type:
|
PDF
|
Additionally:
|
All documents
|
Record key:
|
on1287926329
|
pdf, 6.2 Mb
|
|