Suggested Topics within your search.
Suggested Topics within your search.
Computer security
82
computer security
16
human
13
Humans
10
Information technology: general issues
10
Network hardware
10
Artificial intelligence
9
Computer Security
9
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Network security
9
Computer networking and communications
8
Information technology: general topics
7
Computer networking & communications
6
Computer science
6
Information retrieval
6
QA75 Electronic computers. Computer science
6
Software Engineering
6
Business mathematics & systems
5
Coding theory & cryptology
5
Computer vision
5
Data mining
5
Electrical engineering
5
Privacy
5
QA76 Computer software
5
article
5
Coding theory and cryptology
4
Crime & criminology
4
Design/methodology/approach
4
Pattern recognition
4
privacy
4
-
21
-
22by Neophytou, AndonisSubjects: “...Computer security....”
Published 2011
Get full text
Get full text
Others -
23
-
24
-
25
-
26
-
27
-
28by Whitaker, Robert Bruce“... challenges. The first phase included discovering the most useful and powerful features in existing computer...”
Published 2010
Get full text
Get full text
Others -
29
-
30“... Computer Security is an increasingly important area, considering the sophistication and increase...”
Get full text
Article -
31
-
32
-
33by Ramilli, Marco <1983>“...The field of "computer security" is often considered something in between Art and Science...”
Published 2013
Get full text
Doctoral Thesis -
34
-
35
-
36
-
37“.... For this the objective is to identify existing cloud computing security challenges and their solutions. Identify...”
Get full text
Others -
38by Bowen, Brian M.Subjects: “...Operating systems (Computers)--Security measures...”
Published 2011
Get full text
-
39
-
40by Bouffard, Marc“...Commercial computer security concerns have grown in importance with the continued rise of computer...”
Published 1998
Get full text
Get full text
Others