Refine your search
Availability
-
Authors
- Ammann, Paul
- Bhowmik, Sandeep
- Chao, Lee
- Deugo, Dwight
- Diab, Ahmad
- Elmasri, Ramez
- Gupta, Rajeev
- Marin, Ericsson
- Martin, Keith M.
- Mrabet, Nadia EI
- Navathe, Sham
- Nunes, Eric
- Offutt, Jeff
- Paliath, Vivin
- Pimparkhede, Kunal
- Pujari, Arun K.
- Qin, Zhen
- Qiu, Meikang
- Robertson, John
- Salazar, Rogel
- Shakarian, Jana
- Shakarian, Paulo
- Sharbani Bhattachary...
- Stallings, William
- Taluja, Harish Kumar
- Thai, My T.
- Vacca, John R.
- Vasilakos, Athanasio...
- Xiong, Hu
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Series
-
Topics
- Artificial Intellige...
- Big data
- C (Computer program ...
- C++ (Computer progra...
- Cloud computing
- Cloud Computing
- Computer architectur...
- Computer crimes--Inv...
- Computer Networks - ...
- Computer organizatio...
- Computer programming
- Computer security
- Computer software--T...
- COMPUTERS / Programm...
- Cryptography
- Curves, Elliptic
- Cyber intelligence (...
- Data encryption (Com...
- Data encryption (Com...
- Data mining
- Data protection
- Database management
- Databases
- Identification
- Internet programming
- Java (Computer progr...
- Java - Programming L...
- Mobile computing
- Network Security
- Object-oriented meth...
- Object-oriented prog...
- Online social networ...
- Operations research
- Public key cryptogra...
- Public key infrastru...
- Python (Computer pro...
- Security measures
- Sets of pairs of fun...
- VBScript (Computer p...
- Virtual computer sys...
- Web Services
- Webometrics
- World Wide Web--Secu...
- Show more
- Show less