Safety of computer architectures
Sábháilte in:
Údar corparáideach: | ebrary, Inc |
---|---|
Rannpháirtithe: | Boulanger, Jean-Louis |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla Fraincis |
Foilsithe / Cruthaithe: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Software and systems safety specification and verification /
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Cyber-risk informatics : engineering evaluation with data sciencef /
de réir: Sahinoglu, Mehmet, 1951-
Foilsithe / Cruthaithe: (2016)
de réir: Sahinoglu, Mehmet, 1951-
Foilsithe / Cruthaithe: (2016)
Computer systems performance evaluation and prediction
de réir: Fortier, Paul J.
Foilsithe / Cruthaithe: (2003)
de réir: Fortier, Paul J.
Foilsithe / Cruthaithe: (2003)
Software systems safety /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Computer architecture : an embedded approach /
de réir: McLoughlin, Ian
Foilsithe / Cruthaithe: (2011)
de réir: McLoughlin, Ian
Foilsithe / Cruthaithe: (2011)
Civil avionics systems
de réir: Moir, I. (Ian)
Foilsithe / Cruthaithe: (2013)
de réir: Moir, I. (Ian)
Foilsithe / Cruthaithe: (2013)
Information assurance dependability and security in networked systems /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Software system reliability and security
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Computer architecture /
de réir: Foster, Caxton
Foilsithe / Cruthaithe: (1976)
de réir: Foster, Caxton
Foilsithe / Cruthaithe: (1976)
Computer architecture
de réir: Blanchet, Gerard
Foilsithe / Cruthaithe: (2013)
de réir: Blanchet, Gerard
Foilsithe / Cruthaithe: (2013)
Fault-tolerant systems
de réir: Koren, Israel, 1945-
Foilsithe / Cruthaithe: (2007)
de réir: Koren, Israel, 1945-
Foilsithe / Cruthaithe: (2007)
Security in distributed, grid, mobile, and pervasive computing /
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
Computer system performance modeling in perspective a tribute to the work of Professor Kenneth C. Sevcik /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Computer architecture : a quantitative approach /
de réir: Hennessy, John L.
Foilsithe / Cruthaithe: (2007)
de réir: Hennessy, John L.
Foilsithe / Cruthaithe: (2007)
Computer viruses and other malicious software a threat to the Internet economy.
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Trust and security in collaborative computing
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
Computer organization and architecture : designing for performance /
de réir: Stallings, William
Foilsithe / Cruthaithe: (2003)
de réir: Stallings, William
Foilsithe / Cruthaithe: (2003)
Computer system architecture /
de réir: Mano, M. Morris, 1927-
Foilsithe / Cruthaithe: (1993)
de réir: Mano, M. Morris, 1927-
Foilsithe / Cruthaithe: (1993)
Android security internals : an in-depth guide to android's security architecture /
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
Software for dependable systems sufficient evidence? /
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Logics and languages for reliability and security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Computer and information security handbook
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Computer Forensics jumpstart
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Information security practices : emerging threats and perspectives /
de réir: Traore, Issa
Foilsithe / Cruthaithe: (2016)
de réir: Traore, Issa
Foilsithe / Cruthaithe: (2016)
High-performance computer architecture /
de réir: Stone, Harold S., 1938-
Foilsithe / Cruthaithe: (1993)
de réir: Stone, Harold S., 1938-
Foilsithe / Cruthaithe: (1993)
Securing IM and P2P applications for the enterprise
de réir: Piccard, Paul L.
Foilsithe / Cruthaithe: (2006)
de réir: Piccard, Paul L.
Foilsithe / Cruthaithe: (2006)
Security patterns in practice : designing secure architectures using software patterns /
de réir: Fernandez, Eduardo B., 1936-
Foilsithe / Cruthaithe: (2013)
de réir: Fernandez, Eduardo B., 1936-
Foilsithe / Cruthaithe: (2013)
z/OS 1.6 security services update
de réir: Kappeler, Patrick
Foilsithe / Cruthaithe: (2005)
de réir: Kappeler, Patrick
Foilsithe / Cruthaithe: (2005)
z/OS diagnostic data collection and analysis /
de réir: Rogers, Paul
Foilsithe / Cruthaithe: (2005)
de réir: Rogers, Paul
Foilsithe / Cruthaithe: (2005)
Securing the cloud cloud computer security techniques and tactics /
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
Developing secure distributed systems with CORBA
de réir: Lang, Ulrich
Foilsithe / Cruthaithe: (2002)
de réir: Lang, Ulrich
Foilsithe / Cruthaithe: (2002)
Fundamentals of computer organization and architecture
de réir: Abd-El-Barr, Mostafa, 1950-
Foilsithe / Cruthaithe: (2005)
de réir: Abd-El-Barr, Mostafa, 1950-
Foilsithe / Cruthaithe: (2005)
Learning computer architecture with Raspberry Pi /
de réir: Upton, Eben
Foilsithe / Cruthaithe: (2016)
de réir: Upton, Eben
Foilsithe / Cruthaithe: (2016)
Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach /
Foilsithe / Cruthaithe: (2016)
Foilsithe / Cruthaithe: (2016)
Enterprise architecture for integration rapid delivery methods and technologies /
de réir: Finkelstein, Clive
Foilsithe / Cruthaithe: (2006)
de réir: Finkelstein, Clive
Foilsithe / Cruthaithe: (2006)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
de réir: Bolander, Brian, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Bolander, Brian, et al.
Foilsithe / Cruthaithe: (2014)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Míreanna comhchosúla
-
Software and systems safety specification and verification /
Foilsithe / Cruthaithe: (2011) -
Cyber-risk informatics : engineering evaluation with data sciencef /
de réir: Sahinoglu, Mehmet, 1951-
Foilsithe / Cruthaithe: (2016) -
Computer systems performance evaluation and prediction
de réir: Fortier, Paul J.
Foilsithe / Cruthaithe: (2003) -
Software systems safety /
Foilsithe / Cruthaithe: (2014) -
Computer architecture : an embedded approach /
de réir: McLoughlin, Ian
Foilsithe / Cruthaithe: (2011)