*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 106

1

Computer Security Techniques for Nuclear Facilities
IAEA ; IAEA

Nuclear energy Power resources Computer security Computers Technology Electronic books
*eBook*
2

Securing the cloud: Cloud computer security techniques and tactics (Winkler, V.; 2011) [Book reviews]
Domzal, J.
IEEE Communications Magazine IEEE Commun. Mag. Communications Magazine, IEEE. 49(9):20-20 Sep, 2011

*Academic Journal*
3

Computer Security Techniques for Nuclear Facilities : Technical Guidence
IAEA ; IAEA

Computer security Computer networks--Secur... Nuclear facilities--Secu...
*eBook*
5

Securing the cloud: Cloud computer security techniques and tactics
Brandon A Sullivan
Security Journal. 27:338-340

05 social sciences 0509 other social scienc... 0505 law
*Academic Journal*
7

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Hutton, D.M.
Kybernetes, 2012, Vol. 41, Issue 3/4.

*Academic Journal*
8

Hardware-based Computer Security Techniques to Defeat Hackers : From Biometrics to Quantum Cryptography
Roger R. Dube ; Roger R. Dube

Computer input-output eq... Computer crimes--Prevent... Computer security--Equip... Computer security--Compu...
*eBook*
9

Securing the Cloud : Cloud Computer Security Techniques and Tactics
Winkler, Vic (J.R.) ; Winkler, Vic (J.R.) ; Winkler, Vic (J.R.) ; et al.

*Electronic Resource*
11

Computer Security Techniques: List of controls by cost
EstherH. Highland
Computers & Security. 2:189-193

0202 electrical engineer... 02 engineering and techn...
*Academic Journal*
12

*This result is not displayed to guests*

13

Securing the Cloud: Cloud Computer Security Techniques and Tactics.
EContent. May2011, Vol. 34 Issue 4, p14-14. 1/3p.

CLOUD computing NONFICTION SECURING the Cloud: Clou... WINKLER, J. R.
*Review*
14

Bookshelf
Computer. 44(7):75-75 Jul, 2011

*Academic Journal*
15

Securing the Cloud : Cloud Computer Security Techniques and Tactics
Vic (J.R.) Winkler ; Vic (J.R.) Winkler

Cloud computing Computer security Computer networks--Secur...
*eBook*
16

Hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography.
Richardson, T. D.
Choice: Current Reviews for Academic Libraries. Sep2009, Vol. 47 Issue 1, p150-151. 2p.

Hardware-Based Computer... Dube, Roger Computer security Nonfiction
*Review*
17

*This result is not displayed to guests*

19

*This result is not displayed to guests*

20

Cybercrime: Psychological Tricks and Computer Securities Challenges
Ntogwa Ng’habi Bundala
Asian Journal of Research in Computer Science. 17:1-17

*Academic Journal*

*Filter*