Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 5
- Computer networks 3
- Security measures 3
- Artificial intelligence 1
- Computational intelligence 1
- Computer Security 1
- Computer programs 1
- Data mining 1
- Data warehousing 1
- Database management 1
- Electronic circuits 1
- Engineering 1
- Entrep?ots de donn?ees (Informatique) 1
- Government policy 1
- Human trafficking 1
- Identification 1
- Information filtering systems 1
- Law 1
- Malware (Computer software) 1
- Medical jurisprudence 1
- Prevention 1
- Psychological aspects 1
- Quantitative research 1
- S?ecurit?e informatique 1
- Science 1
- Security systems 1
- Sex and law 1
- Signal processing 1
- Social aspects 1
- System safety 1
-
1
-
2
-
3
Science under attack : the age of unreason / Ralph B. Alexander.
Published 2018Full text (Wentworth users only)
Electronic eBook -
4
Modern Cryptography Theory and Practice / Mao, Wenbo.
Published 2003Full text (Wentworth users only)
Electronic eBook -
5
-
6
Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs by Nils Wisiol.
Published 2023Full text (Wentworth users only)
Electronic eBook -
7
The war on human trafficking : U.S. policy assessed / Anthony M. DeStefano.
Published 2007Full text (Wentworth users only)
Electronic eBook -
8
Seven Deadliest Web Application Attacks Shema, Mike.
Published 2010Full text (Wentworth users only)
Electronic eBook -
9
Web application security is a stack : how to CYA (Cover Your Apps) completely / Lori Mac Vittie.
Published 2015Full text (Wentworth users only)
Electronic eBook -
10
Web application security is a stack : how to CYA (Cover Your Apps) completely / Lori Mac Vittie.
Published 2015Full text (Wentworth users only)
Electronic eBook -
11
-
12
-
13