Suggested Topics within your search.
Suggested Topics within your search.
- Data structures (Computer science)
- Computer science 113
- Data encryption (Computer science) 73
- Computer networks 68
- Information storage and retrieval systems 64
- Computer network architectures 43
- Database management 30
- Data protection 27
- Coding theory 26
- Multimedia systems 14
- Telecommunication 12
- Computer vision 11
- Optical pattern recognition 11
- Software engineering 11
- Artificial intelligence 6
- Electronic commerce 6
- Engineering 6
- Management information systems 6
- Data transmission systems 5
- Economics 5
- Operating systems (Computers) 5
- Computer simulation 4
- Data mining 4
- Bioinformatics 3
- Biometry 3
- Information theory 3
- Mathematics 3
- Computer graphics 2
- Computer software 2
- Computers 2
-
1
Data and Application Security : Developments and Directions / edited by Bhavani Thuraisingham, Reind Riet, Klaus R. Dittrich, Zahir Tari.
Published 2002“…Springer US,…”
Full text (Wentworth users only)
Electronic eBook -
2
-
3
From Grids to Service and Pervasive Computing edited by Thierry Priol, Marco Vanneschi.
Published 2008“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
4
Grid Computing Achievements and Prospects / edited by Sergei Gorlatch, Paraskevi Fragopoulou, Thierry Priol.
Published 2008“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
5
-
6
Global Initiatives to Secure Cyberspace An Emerging Landscape / edited by Michael Portnoy, Seymour Goodman.
Published 2009“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
7
The Austin Protocol Compiler by Tommy M. McGuire, Mohamed G. Gouda.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
8
-
9
Intrusion Detection and Correlation Challenges and Solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
10
Image and Video Encryption From Digital Rights Management to Secured Personal Communication / edited by Sushil Jajodia.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
11
Privacy, Security and Trust within the Context of Pervasive Computing edited by Philip Robinson, Harald Vogt, Waleed Wagealla.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
12
Encyclopedia of Cryptography and Security edited by Henk C. A. Tilborg.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
13
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems edited by Jerzy Pejaś, Andrzej Piegat.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
14
Semistructured Database Design by Tok Wang Ling, Mong Li Lee, Gillian Dobbie.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
15
Coding for Data and Computer Communications by David Salomon.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
16
Trusted Computing Platforms: Design and Applications by Sean W. Smith.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
17
Computer Security in the 21st Century edited by D. T. Lee, S. P. Shieh, J. D. Tygar.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
18
-
19
Mining Sequential Patterns from Large Data Sets by Wei Wang, Jiong Yang.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook -
20
Fuzzy Database Modeling with XML by Zongmin Ma.
Published 2005“…Springer US,…”
Full text (Wentworth users only).
Electronic eBook