Nearby SUBJECTS are:
Result Page   Prev Next
Save   Year Entries
Computer scientists -- Political activity -- United States -- History : Slayton, Rebecca,; Fu Ssu-Nien Library; PRINTED  2013 1
Computer scientists -- United States -- Biography   4
Computer Scince : International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems; 中央研究院; 電子書  2014 1
Computer scinence : Information Sci. Lib.; PRINTED  2003 1
  Computer security -- See also Computers Access control   1
Computer security   870
Computer security -- Access control : Daemen, Joan,; 中央研究院; COMPUTER FILE  2020 1
Computer security -- Asia   2
Computer security -- Balkan Peninsula -- Congresses : Senior Leadership Roundtable on Military and Defence Aspects of Border Security in South East Europe; 中央研究院; PRINTED  2019 1
Computer security -- Case studies   2
Computer security -- China   4
Computer security -- China -- Congresses : 中央研究院; COMPUTER FILE  2020 1
Computer security -- China -- History -- Congresses : 中央研究院; 電子書  c2004 1
Computer security.;Cocoa (Application development environment) : Lee, Graham J; Department of Information Technology Services; COMPUTER FILE  2010 1
Computer security.;Computer crimes : Anzaldua, Reynaldo; Department of Information Technology Services; COMPUTER FILE  2008 1
Computer security.;Computer crimes -- Prevention : Winkler, Ira; Department of Information Technology Services; COMPUTER FILE  2007 1
Computer security.;Computer hackers   2
Computer security.;Computer hackers.;Computer networks -- Security measures   2
Computer security.;Computer networks -- Security measures   6
Computer security.;Computer networks -- Security measures.;Application software -- Security measures.;SQL (Computer program language) : Clarke-Salt, Justin; Department of Information Technology Services; COMPUTER FILE  2012 1
Computer security.;Computer networks -- Security measures.;Computer crimes -- Investments.;Forensic sciences : Solomon, Michael G; Department of Information Technology Services; COMPUTER FILE  2011 1
Computer security.;Computer networks -- Security measures.;Computer hackers   2
Computer security.;Computer networks -- Security measures.;Computer viruses : Nazario, Jose; Department of Information Technology Services; COMPUTER FILE  2003 1
Computer security.;Computer networks -- Security measures.;Internet -- Security measures : Nahari, Hadi; Department of Information Technology Services; COMPUTER FILE  2011 1
Computer security.;Computer networks -- Security measures.;Internet -- Security measures.;Cryptography.;Data encryption (Computer science);Technology -- Research -- United States : Patch, Kimberly; Department of Information Technology Services; COMPUTER FILE  2003 1
Computer security.;Computer networks -- Security measures.;World Wide Web -- Security measures : Huseby, Sverre H; Department of Information Technology Services; COMPUTER FILE  2004 1
Computer security -- Computer programs.;Computer games.;Software protection.;Computer networks -- Security measures : Tamagne, Florence; Department of Information Technology Services; COMPUTER FILE  2004 1
Computer security.;Computer science : Syngress Media, Inc. Staff; Department of Information Technology Services; COMPUTER FILE  2003 1
Computer security.;Computer security -- Forecasting : Howard, Doug; Department of Information Technology Services; COMPUTER FILE  2010 1
Computer security.;Computers -- Access control.;Computer networks -- Security measures : Buchanan, Cameron; Department of Information Technology Services; COMPUTER FILE  2014 1
Computer security.;Computers -- Access control -- Passwords : Burnett, Mark; Department of Information Technology Services; COMPUTER FILE  2006 1
Computer security -- Congresses   1300
Computer security -- Congresses.;Computer logic -- Congresses : Grumberg, O; Department of Information Technology Services; COMPUTER FILE  2008 1
Computer security -- Congresses.;Computer networks -- Security measures -- Congresses : Doyle, Arthur Conan; Department of Information Technology Services; COMPUTER FILE  1993 1
Computer security -- Congresses.;Computers -- Access control -- Congresses   4
Computer security -- Congresses.;Computers -- Access control -- Congresses.;Data encryption (Computer science) -- Congresses.;Public key cryptography -- Congresses : Berg, Alan Mark; Department of Information Technology Services; COMPUTER FILE  2009 1
Computer security -- Congresses.;Cryptography -- Congresses   5
Computer security -- Congresses.;Cryptography -- Congresses.;Data encryption (Computer science) -- Congresses : Gori, U; Department of Information Technology Services; COMPUTER FILE  2009 1
Computer security -- Congresses.;Data encryption (Computer science) -- Congresses.;Public key infrastructure (Computer security) -- Congresses : Potts, Jim; Department of Information Technology Services; COMPUTER FILE  2010 1
Computer security -- Congresses.;Data encryption (Computer science);Data protection -- Congresses : Aronson, Bill; Department of Information Technology Services; COMPUTER FILE  2011 1
Computer security -- Congresses.;Data integrity -- Congresses.;Data protection -- Congresses : Mordini, E; Department of Information Technology Services; COMPUTER FILE  2008 1
Computer security -- Congresses.;Databases -- Statistics -- Congresses.;Data protection -- Congresses : Robinson, Shirleene; Department of Information Technology Services; COMPUTER FILE  2010 1
Computer security -- Congresses.;Formal methods (Computer science) -- Congresses.;Trust -- Congresses : Lancaster, Mark; Department of Information Technology Services; COMPUTER FILE  2011 1
Computer security -- Congresses.;Information technology : Bhattacharya, Bhargab B; Department of Information Technology Services; COMPUTER FILE  2008 1
Computer security -- Congresses.;Information technology -- Congresses : Fontaine, J.-G; Department of Information Technology Services; COMPUTER FILE  2006 1
Computer security -- Congresses.;Security systems -- Congresses : Allen, Lee; Department of Information Technology Services; COMPUTER FILE  2012 1
Computer security.;Cryptography : Ryabko, Boris; Department of Information Technology Services; COMPUTER FILE  2005 1
Computer security.;Cryptography.;Data encryption (Computer science) : Tokareva, Natalia; Department of Information Technology Services; COMPUTER FILE  2015 1
Computer security.;Cryptography -- Mathematics.;Data encryption (Computer science);Open source software : McAndrew, Alasdair; Department of Information Technology Services; COMPUTER FILE  2011 1
Computer security.;Cryptography -- Standards.;Computers -- Access control -- Standards : Dent, Alex; Department of Information Technology Services; COMPUTER FILE  2004 1
Result Page   Prev Next