Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Computer science
- Information storage and retrieval systems 1,601
- Software engineering 1,085
- Artificial intelligence 927
- Computer software 799
- Data encryption (Computer science) 539
- Data protection 387
- Database management 358
- Data mining 292
- Operating systems (Computers) 272
- Logic design 268
- Data structures (Computer science) 249
- Computational complexity 207
- Computer network architectures 207
- Telecommunication 189
- Multimedia systems 184
- Computer system performance 170
- Computer simulation 158
- Computer vision 152
- Computer engineering 139
- Computers 124
- Mathematics 115
- Application software 91
- Computer graphics 91
- Optical pattern recognition 89
- Data processing 85
- Coding theory 84
- Computer security 72
- Management information systems 69
-
1
How to Cheat at Designing Security for a Windows Server 2003 Network.
Published 2006Full text (Wentworth users only)
Electronic eBook -
2
Content Networking : Architecture, Protocols, and Practice.
Published 2005Full text (Wentworth users only)
Electronic eBook -
3
Electronic engineering and information science : selected, peer reviewed papers from the 2014 International Conference on Electronic Engineering and Information Science (ICEEIS 201...
Published 2014Full text (Wentworth users only)
Electronic Conference Proceeding eBook -
4
Security in Wireless Networks and Mobile Platforms.
Published 2006Full text (Wentworth users only)
Electronic eBook -
5
Securing the Virtual Environment : How to Defend the Enterprise Against Attack (with DVD).
Published 2012Full text (Wentworth users only)
Electronic eBook -
6
-
7
Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.
Published 2012Full text (Wentworth users only)
Electronic eBook -
8
Cyber attacks and security breaches : coping with external threats.
Published 2014Streaming video (Wentworth users only)
Electronic Video -
9
Cyber attacks : the best defense is a good offense.
Published 2014Streaming video (Wentworth users only)
Electronic Video -
10
Cyber terror and cyber risk : what you need to know.
Published 2014Streaming video (Wentworth users only)
Electronic Video -
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20