Works matching DE "COMPUTER security software"


Results: 298
    1
    2
    3
    4

    Inhalt.

    Published in:
    2023
    Publication type:
    Table of Contents
    5
    6
    7
    8
    9
    10
    12
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24

    PROTECTING SENSOR DATA FROM MALWARE ATTACKS.

    Published in:
    Intel Technology Journal, 2014, v. 18, n. 4, p. 178
    By:
    • Edwards, Jonathan;
    • Grewal, Ken;
    • LeMay, Michael;
    • Robinson, Scott H.;
    • Sahita, Ravi;
    • Woodward, Carl
    Publication type:
    Article
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35

    Risks of Cloud Computing.

    Published in:
    Systémová Integrace, 2013, v. 20, n. 3, p. 63
    By:
    • Fortinová, Jana
    Publication type:
    Article
    36

    SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.

    Published in:
    International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
    By:
    • Nath, Ratnadeep;
    • Saha, Bishal;
    • Laskar, Aminullah;
    • Majumder, Sudipta
    Publication type:
    Article
    37
    38
    39
    40

    Improved Text Watermarking Technique.

    Published in:
    International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 5, p. 190
    By:
    • Kaur Cheema, Prabhjot;
    • Kaur, Kamaljit
    Publication type:
    Article
    41
    42
    43
    44
    45

    Input Contract Testing of Graphical User Interfaces.

    Published in:
    International Journal of Software Engineering & Knowledge Engineering, 2016, v. 26, n. 2, p. 183, doi. 10.1142/S0218194016500091
    By:
    • Tuglular, Tugkan;
    • Belli, Fevzi;
    • Linschulte, Michael
    Publication type:
    Article
    46
    47
    48

    tools of the trade.

    Published in:
    Strategic Finance, 2004, v. 85, n. 9, p. 56
    Publication type:
    Article
    49

    tools of the trade.

    Published in:
    Strategic Finance, 2004, v. 85, n. 8, p. 54
    Publication type:
    Article
    50

    Securing the Hardware.

    Published in:
    Strategic Finance, 2004, v. 85, n. 8, p. 55
    By:
    • Castelluccio, Michael
    Publication type:
    Article