Safety of computer architectures
Gardado en:
Autor Corporativo: | ebrary, Inc |
---|---|
Outros autores: | Boulanger, Jean-Louis |
Formato: | Electrónico eBook |
Idioma: | inglés francés |
Publicado: |
London : Hoboken, N.J. :
ISTE ; b Wiley,
2010.
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
Software and systems safety specification and verification /
Publicado: (2011)
Publicado: (2011)
Cyber-risk informatics : engineering evaluation with data sciencef /
por: Sahinoglu, Mehmet, 1951-
Publicado: (2016)
por: Sahinoglu, Mehmet, 1951-
Publicado: (2016)
Computer systems performance evaluation and prediction
por: Fortier, Paul J.
Publicado: (2003)
por: Fortier, Paul J.
Publicado: (2003)
Software systems safety /
Publicado: (2014)
Publicado: (2014)
Computer architecture : an embedded approach /
por: McLoughlin, Ian
Publicado: (2011)
por: McLoughlin, Ian
Publicado: (2011)
Civil avionics systems
por: Moir, I. (Ian)
Publicado: (2013)
por: Moir, I. (Ian)
Publicado: (2013)
Information assurance dependability and security in networked systems /
Publicado: (2008)
Publicado: (2008)
Computer security fundamentals /
por: Easttom, Chuck
Publicado: (2006)
por: Easttom, Chuck
Publicado: (2006)
Software system reliability and security
Publicado: (2007)
Publicado: (2007)
Computer architecture /
por: Foster, Caxton
Publicado: (1976)
por: Foster, Caxton
Publicado: (1976)
Computer architecture
por: Blanchet, Gerard
Publicado: (2013)
por: Blanchet, Gerard
Publicado: (2013)
Fault-tolerant systems
por: Koren, Israel, 1945-
Publicado: (2007)
por: Koren, Israel, 1945-
Publicado: (2007)
Security in distributed, grid, mobile, and pervasive computing /
por: Xiao, Yang
Publicado: (2007)
por: Xiao, Yang
Publicado: (2007)
Computer system performance modeling in perspective a tribute to the work of Professor Kenneth C. Sevcik /
Publicado: (2006)
Publicado: (2006)
Computer architecture : a quantitative approach /
por: Hennessy, John L.
Publicado: (2007)
por: Hennessy, John L.
Publicado: (2007)
Computer viruses and other malicious software a threat to the Internet economy.
Publicado: (2009)
Publicado: (2009)
Trust and security in collaborative computing
por: Zou, Xukai, 1963-
Publicado: (2008)
por: Zou, Xukai, 1963-
Publicado: (2008)
Computer organization and architecture : designing for performance /
por: Stallings, William
Publicado: (2003)
por: Stallings, William
Publicado: (2003)
Computer system architecture /
por: Mano, M. Morris, 1927-
Publicado: (1993)
por: Mano, M. Morris, 1927-
Publicado: (1993)
Android security internals : an in-depth guide to android's security architecture /
por: Elenkov, Nikolay
Publicado: (2015)
por: Elenkov, Nikolay
Publicado: (2015)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
por: Bradley, Tony
Publicado: (2006)
por: Bradley, Tony
Publicado: (2006)
Software for dependable systems sufficient evidence? /
Publicado: (2007)
Publicado: (2007)
Logics and languages for reliability and security
Publicado: (2010)
Publicado: (2010)
Computer and information security handbook
Publicado: (2013)
Publicado: (2013)
Computer Forensics jumpstart
Publicado: (2011)
Publicado: (2011)
Information security practices : emerging threats and perspectives /
por: Traore, Issa
Publicado: (2016)
por: Traore, Issa
Publicado: (2016)
High-performance computer architecture /
por: Stone, Harold S., 1938-
Publicado: (1993)
por: Stone, Harold S., 1938-
Publicado: (1993)
Securing IM and P2P applications for the enterprise
por: Piccard, Paul L.
Publicado: (2006)
por: Piccard, Paul L.
Publicado: (2006)
Security patterns in practice : designing secure architectures using software patterns /
por: Fernandez, Eduardo B., 1936-
Publicado: (2013)
por: Fernandez, Eduardo B., 1936-
Publicado: (2013)
z/OS 1.6 security services update
por: Kappeler, Patrick
Publicado: (2005)
por: Kappeler, Patrick
Publicado: (2005)
z/OS diagnostic data collection and analysis /
por: Rogers, Paul
Publicado: (2005)
por: Rogers, Paul
Publicado: (2005)
Securing the cloud cloud computer security techniques and tactics /
por: Winkler, J. R. (Joachim R.)
Publicado: (2011)
por: Winkler, J. R. (Joachim R.)
Publicado: (2011)
Developing secure distributed systems with CORBA
por: Lang, Ulrich
Publicado: (2002)
por: Lang, Ulrich
Publicado: (2002)
Fundamentals of computer organization and architecture
por: Abd-El-Barr, Mostafa, 1950-
Publicado: (2005)
por: Abd-El-Barr, Mostafa, 1950-
Publicado: (2005)
Learning computer architecture with Raspberry Pi /
por: Upton, Eben
Publicado: (2016)
por: Upton, Eben
Publicado: (2016)
Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach /
Publicado: (2016)
Publicado: (2016)
Enterprise architecture for integration rapid delivery methods and technologies /
por: Finkelstein, Clive
Publicado: (2006)
por: Finkelstein, Clive
Publicado: (2006)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
por: Bolander, Brian, et al.
Publicado: (2014)
por: Bolander, Brian, et al.
Publicado: (2014)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
por: Mularien, Peter
Publicado: (2010)
por: Mularien, Peter
Publicado: (2010)
Web commerce security design and development /
por: Nahari, Hadi
Publicado: (2011)
por: Nahari, Hadi
Publicado: (2011)
Títulos similares
-
Software and systems safety specification and verification /
Publicado: (2011) -
Cyber-risk informatics : engineering evaluation with data sciencef /
por: Sahinoglu, Mehmet, 1951-
Publicado: (2016) -
Computer systems performance evaluation and prediction
por: Fortier, Paul J.
Publicado: (2003) -
Software systems safety /
Publicado: (2014) -
Computer architecture : an embedded approach /
por: McLoughlin, Ian
Publicado: (2011)