Safety of computer architectures
Saved in:
Corporate Author: | ebrary, Inc |
---|---|
Other Authors: | Boulanger, Jean-Louis |
Format: | Electronic eBook |
Language: | English French |
Published: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Software and systems safety specification and verification /
Published: (2011)
Published: (2011)
Cyber-risk informatics : engineering evaluation with data sciencef /
by: Sahinoglu, Mehmet, 1951-
Published: (2016)
by: Sahinoglu, Mehmet, 1951-
Published: (2016)
Computer systems performance evaluation and prediction
by: Fortier, Paul J.
Published: (2003)
by: Fortier, Paul J.
Published: (2003)
Software systems safety /
Published: (2014)
Published: (2014)
Civil avionics systems
by: Moir, I. (Ian)
Published: (2013)
by: Moir, I. (Ian)
Published: (2013)
Computer architecture : an embedded approach /
by: McLoughlin, Ian
Published: (2011)
by: McLoughlin, Ian
Published: (2011)
Information assurance dependability and security in networked systems /
Published: (2008)
Published: (2008)
Computer security fundamentals /
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Software system reliability and security
Published: (2007)
Published: (2007)
Computer architecture /
by: Foster, Caxton
Published: (1976)
by: Foster, Caxton
Published: (1976)
Computer architecture
by: Blanchet, Gerard
Published: (2013)
by: Blanchet, Gerard
Published: (2013)
Fault-tolerant systems
by: Koren, Israel, 1945-
Published: (2007)
by: Koren, Israel, 1945-
Published: (2007)
Security in distributed, grid, mobile, and pervasive computing /
by: Xiao, Yang
Published: (2007)
by: Xiao, Yang
Published: (2007)
Computer system performance modeling in perspective a tribute to the work of Professor Kenneth C. Sevcik /
Published: (2006)
Published: (2006)
Computer architecture : a quantitative approach /
by: Hennessy, John L.
Published: (2007)
by: Hennessy, John L.
Published: (2007)
Computer viruses and other malicious software a threat to the Internet economy.
Published: (2009)
Published: (2009)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
Computer organization and architecture : designing for performance /
by: Stallings, William
Published: (2003)
by: Stallings, William
Published: (2003)
Computer system architecture /
by: Mano, M. Morris, 1927-
Published: (1993)
by: Mano, M. Morris, 1927-
Published: (1993)
Android security internals : an in-depth guide to android's security architecture /
by: Elenkov, Nikolay
Published: (2015)
by: Elenkov, Nikolay
Published: (2015)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
by: Bradley, Tony
Published: (2006)
by: Bradley, Tony
Published: (2006)
Logics and languages for reliability and security
Published: (2010)
Published: (2010)
Software for dependable systems sufficient evidence? /
Published: (2007)
Published: (2007)
Computer and information security handbook
Published: (2013)
Published: (2013)
Computer Forensics jumpstart
Published: (2011)
Published: (2011)
High-performance computer architecture /
by: Stone, Harold S., 1938-
Published: (1993)
by: Stone, Harold S., 1938-
Published: (1993)
Securing IM and P2P applications for the enterprise
by: Piccard, Paul L.
Published: (2006)
by: Piccard, Paul L.
Published: (2006)
Information security practices : emerging threats and perspectives /
by: Traore, Issa
Published: (2016)
by: Traore, Issa
Published: (2016)
Security patterns in practice : designing secure architectures using software patterns /
by: Fernandez, Eduardo B., 1936-
Published: (2013)
by: Fernandez, Eduardo B., 1936-
Published: (2013)
z/OS 1.6 security services update
by: Kappeler, Patrick
Published: (2005)
by: Kappeler, Patrick
Published: (2005)
z/OS diagnostic data collection and analysis /
by: Rogers, Paul
Published: (2005)
by: Rogers, Paul
Published: (2005)
Developing secure distributed systems with CORBA
by: Lang, Ulrich
Published: (2002)
by: Lang, Ulrich
Published: (2002)
Securing the cloud cloud computer security techniques and tactics /
by: Winkler, J. R. (Joachim R.)
Published: (2011)
by: Winkler, J. R. (Joachim R.)
Published: (2011)
Fundamentals of computer organization and architecture
by: Abd-El-Barr, Mostafa, 1950-
Published: (2005)
by: Abd-El-Barr, Mostafa, 1950-
Published: (2005)
Learning computer architecture with Raspberry Pi /
by: Upton, Eben
Published: (2016)
by: Upton, Eben
Published: (2016)
Enterprise architecture for integration rapid delivery methods and technologies /
by: Finkelstein, Clive
Published: (2006)
by: Finkelstein, Clive
Published: (2006)
Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach /
Published: (2016)
Published: (2016)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
by: Bolander, Brian, et al.
Published: (2014)
by: Bolander, Brian, et al.
Published: (2014)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Similar Items
-
Software and systems safety specification and verification /
Published: (2011) -
Cyber-risk informatics : engineering evaluation with data sciencef /
by: Sahinoglu, Mehmet, 1951-
Published: (2016) -
Computer systems performance evaluation and prediction
by: Fortier, Paul J.
Published: (2003) -
Software systems safety /
Published: (2014) -
Civil avionics systems
by: Moir, I. (Ian)
Published: (2013)