Suggested Topics within your search.
Suggested Topics within your search.
- Computer software
- Computer security 10
- Reliability 6
- Security measures 6
- Computer networks 4
- Verification 4
- Computer crimes 2
- Computer hackers 2
- Computer systems 2
- Cyber intelligence (Computer security) 2
- Data processing 2
- Development 2
- Mathematical models 2
- Penetration testing (Computer security) 2
- Prevention 2
- Risk assessment 2
- Software engineering 2
- Software protection 2
- Statistical methods 2
- System safety 2
- System theory 2
- Testing 2
-
1
Software system reliability and security
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Software system reliability and security
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Fuzzing for software security testing and quality assurance
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Fuzzing for software security testing and quality assurance
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Published 2013Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Published 2013Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Software and systems safety specification and verification /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Software and systems safety specification and verification /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Verification of infinite-state systems with applications to security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Verification of infinite-state systems with applications to security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
13
Cyber-risk informatics : engineering evaluation with data sciencef /
Published 2016Subjects: “…Cyber intelligence (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Cyber-risk informatics : engineering evaluation with data sciencef /
Published 2016Subjects: “…Cyber intelligence (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook