Search again

Found: 45  Titles

Order by :    Show:   Per Page
image

image
Hardware malware Christian Krieg [and four others]
Author
Krieg, Christian.
Published
[San Rafael, CA] : Morgan & Claypool, c2013.
Call Number
Ebook

image

image
High-throughput string matching on reconfigurable hardware = ไฮทรูพุทสตริงแมทชิ่งสำหรับรีคอนฟิกกิวรีเบิลฮาร์ดแวร์ / Thinh Tran Ngoc.
Author
Tran, Ngoc Thinh.
Published
2006.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image

image

image
Introduction to cryptography principles and applications / Hans Delfs, Helmut Knebl.
Author
Delfs, Hans.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image

image
Moving target defense creating asymmetric uncertainty for cyber threats / Sushil Jajodia ... [et al.], editors
Author
Jajodia, Sushil,
Published
New York : Springer, c2011.
Call Number
Ebook

image
Network science and cybersecurity Robinson E. Pino, editor.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image

image

image

image
Preventing good people from doing bad things implementing least privilege / John Mutch, Brian Anderson
Author
Mutch, John
Published
Berkeley, CA : Apress, c2011.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles