computer hardware PDF: 41 to 50 of 1000 results fetched - page 5 [ec]

Zoolz is the only cloud solution that keeps your data even when you disconnect your drives
Now you can translate your PDF documents automatically to dozens of languages.

Computer Security

https://www.ebooks.com/cj.asp?IID=96328181&fc=GB&cjsku=96328181...
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 
Category: COMPUTERS. ISBN:

Computer Networks

https://www.ebooks.com/cj.asp?IID=2465751&fc=AU&cjsku=2465751...
This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in June 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectural issues, Internet and wireless solutions, teleinformatics and communications, new technologies, queueing theory and queueing networks, innovative applications, networking in e-business, security aspects of hardware and software, industrial systems, quantum and bio-informatics, cloud networking and services.
Category: COMPUTERS. ISBN:

Computer Networks

https://www.ebooks.com/cj.asp?IID=2465751&fc=CA&cjsku=2465751...
This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in June 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectural issues, Internet and wireless solutions, teleinformatics and communications, new technologies, queueing theory and queueing networks, innovative applications, networking in e-business, security aspects of hardware and software, industrial systems, quantum and bio-informatics, cloud networking and services.
Category: COMPUTERS. ISBN:

Computer Security

https://www.ebooks.com/cj.asp?IID=96328181&fc=US&cjsku=96328181...
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 
Category: COMPUTERS. ISBN:

Computer Security

https://www.ebooks.com/cj.asp?IID=819182&fc=US&cjsku=819182...
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign-on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
Category: COMPUTERS. ISBN:

Computer Security

https://www.ebooks.com/cj.asp?IID=819182&fc=CA&cjsku=819182...
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign-on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
Category: COMPUTERS. ISBN:

Computer Security

https://www.ebooks.com/cj.asp?IID=819182&fc=AU&cjsku=819182...
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign-on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
Category: COMPUTERS. ISBN:

Computer Security

https://www.ebooks.com/cj.asp?IID=819182&fc=GB&cjsku=819182...
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign-on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
Category: COMPUTERS. ISBN:

Computer Logic

https://www.ebooks.com/cj.asp?IID=1257521&fc=AU&cjsku=1257521...
An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications.Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.
Category: COMPUTERS. ISBN:

Computer Logic

https://www.ebooks.com/cj.asp?IID=1257521&fc=CA&cjsku=1257521...
An understanding of modern computer logic-incorporating core knowledge of number systems, number conversions, Boolean algebra, memories, and logic circuits-is fundamental to further study of computer architectures, system software, and computer networks. Computer Logic: Design Principles and Applications introduces and describes the relevant concepts, principles and applications of modern computer logic design. The book is self-contained, with an introductory chapter that concisely covers the history of computing devices, as well as number systems, number conversions, signed and unsigned integers, external code, and digital and digitizing concepts. Dedicated chapters on Boolean algebra, transistor circuits, combinatorial logic circuits, and sequential logic circuits round off the work. The emphasis is on design and applications.Topics and features: * Explains Boolean Algebra and logic design essentials in clear fashion * Includes modern topics, such as Unicode, Exclusive Or Theorems, unipolar transistors, copper technology, flash memory, Hardware Descriptive Language, and logic simulation software tools * Thorough coverage of combinatorial logic and provides numerous design examples, such as gates, decoders and encoders, comparators, carry-save and carry-propagated adders, multiplication trees, and programmable logic arrays * Provides chapter-by-chapter summary points, supplementary examples, and exercises * Sequential logic presented, with numerous design examples, such as flip-flops, counters, shift registers, sequencers, and excitation tables With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for advanced students and practitioners in computer science, computer engineering, and electrical engineering. Anyone seeking to develop a solid grounding in computer logic, circuit design, and logic design will find the book an essential and practical learning tool.
Category: COMPUTERS. ISBN:
Previous1234 [5] 6789Next