Search Results - "Computer security."
-
181
-
182
-
183
-
184
24 deadly sins of software security programming flaws and how to fix them
Published 2010Available for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access
Also available remotely for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access thru EZproxy
Electronic Resource -
185
Security for wireless sensor networks using identity-based cryptography
Published 2013Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
186
-
187
-
188
-
189
-
190