Showing
1 - 3
results of
3
Skip to content
Institutional Login
Language
English
Te reo Māori
Books & media
Combined Results
Books & media
Articles & more
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Page will reload when a filter is removed.
Applied Filters:
Suggested Topics:
Remove Filter
Software engineering
AND
Remove Filter
Software
Page will reload when a filter is removed.
Show filters (2)
Suggested Topics:
Remove Filter
Software engineering
AND
Remove Filter
Software
Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
Computer Security
3
Software
Software engineering
Computer Communication Networks
2
Computer networks
2
Computer security
2
Security measures
2
Sensor networks
1
Telemetry
1
Showing
1 - 3
results of
3
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Engineering secure software and systems : second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by
Massacci, Fabio
,
Wallach, Dan Seth, 1971-
,
Zannone, Nicola
Published 2010
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 2
2
Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings /
by
Jürjens, Jan
,
Livshits, Benjamin
,
Scandariato, Riccardo
Published 2013
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 3
3
Information and communication technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings /
Published 2013
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
–
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Location
Online
3 results
3
Item type
Ebook
3 results
3
Year of Publication
From:
To:
Items from Articles & more search
Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security
by
Thapliyal, Nachiket
, et al.
Visual Analysis of Computer Security Data Using Artificial Neural Networks
by
Zhernova, Ksenia
, et al.
Application of Computer Security Management in Internet Finance
by
Yu, Zhibin
Teaching Computer Security in a Secondary School
by
Mottl, J.
Design of Computer Security Algorithm Based on Differential Evolution and Analysis of Data Structure Discreteness
by
Chen, Xiaohai
, et al.
More results…