Year of publication
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Computer • security
Search without synonyms: keywords:(Computer security)
Used synonyms:
- computers
- digitale datenverarbeitungsanlage
- digitale rechenanlage
- digitaler computer
- digitalrechner
- dva
- edp hardware
- edv anlage
- edv hardware
- electronic data processing machines
- electronic digital computers
- elektronenrechner
- elektronische datenverarbeitungsanlage
- elektronische rechenanlage
- elektronischer rechenautomat
- elektronisches datenverarbeitungssystem
- programmgesteuerter digitaler rechenautomat
- rechenanlage
- rechenautomat
- rechner
Used synonyms:
- safety
- sicherheit
-
我的電腦,你的檔案──論刑法第359條「他人電磁紀錄」之範圍界定 My Computer, Your File -Discussion about the Scope of Criminal Law Article 359 “Magnetic Record of Another”
Free accessDOAJ | 2020|Keywords: computer crime, security of computer use, legal benefit of computer -
وضعیت ایمنی بیمار در مراکز آموزشی - درمانی منتخب دانشگاه علوم پزشکی اصفهان
Free accessDOAJ | 2015|Keywords: Patient Safety, Computer applications to medicine. Medical informatics -
وضعیت امنیت اطلاعات در سیستمهای اطلاعات بیمارستانی
Free accessDOAJ | 2013|Keywords: Data Security, Computer applications to medicine. Medical informatics -
الزامات بهبود کیفیت و ایمنی بیمار در سیستم اطلاعات بیمارستان
Free accessDOAJ | 2014|Keywords: Patient Safety, Computer applications to medicine. Medical informatics -
Сomputational Simulation of the Light Propagation Process through Nonlinear Media
Springer Verlag | 2014|Keywords: Quality Control, Reliability, Safety and Risk, Image Processing and Computer Vision -
ПРИНЦИПИ МОДЕЛЮВАННЯ
Free accessDOAJ | 2016|Keywords: computer game, Industrial safety. Industrial accident prevention -
Обеспечение безопасности корпоративных сетей на основе оборудования D-Link
Free accessDOAJ | 2023|Keywords: port security, security, Electronic computers. Computer science -
ІNFORMATION TECHNOLOGIES AS A TECHNICAL BASIS FOR THE DEVELOPMENT OF MODERN METHODS OF TEACHING MILITARY-TECHNICAL SUBJECTS
Free accessDOAJ | 2019|Keywords: computer training systems, Industrial safety. Industrial accident prevention -
ЗАГАЛЬНИЙ МЕТОДИЧНИЙ ПІДХІД ДО СТВОРЕННЯ НАВЧАЛЬНИХ КОМП’ЮТЕРНИХ 3D МОДЕЛЕЙ ВІЙСЬКОВО-ТЕХНІЧНОГО ПРИЗНАЧЕННЯ
Free accessDOAJ | 2014|Keywords: educational 3d computer models, Industrial safety. Industrial accident prevention -
χ2 cryptanalysis of the SEAL encryption algorithm
Springer Verlag | 2006|Keywords: Computer Science, Systems and Data Security, Discrete Mathematics in Computer Science -
τJSchema: A Framework for Managing Temporal JSON-Based NoSQL Databases
Springer Verlag | 2016|Keywords: Computer Science, Systems and Data Security -
π-local Operations in Composite Quantum Systems with Applications to Multipartite Entanglement
Springer Verlag | 2011|Keywords: Computer Science, Computer Communication Networks, Systems and Data Security -
π-Cipher: Authenticated Encryption for Big Data
British Library Conference Proceedings | 2014|Keywords: Computer security, Computer networks, Data encryption (Computer science) -
π-Cipher: Authenticated Encryption for Big Data
Springer Verlag | 2014|Keywords: Computer Science, Systems and Data Security -
μTSS - A Simplified Trusted Software Stack
British Library Conference Proceedings | 2010|Keywords: Computer security, Computer networks, Computer software -
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks
British Library Conference Proceedings | 2013|Keywords: Computer security, Autonomous spontaneous security, Spontaneous security, Security -
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks
Springer Verlag | 2013|Keywords: Sensor Network Security, Computer Science, Systems and Data Security, Computer Communication Networks -
μDTNSec: a security layer with lightweight certificates for Disruption-Tolerant Networks on microcontrollers
Springer Verlag | 2018|Keywords: Security, Computer Communication Networks -
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mu $$\end{document}IPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems
Springer Verlag | 2024|Keywords: Embedded Systems Security, Computer Science, Systems and Data Security, Security Services, Mobile and Network Security, Computer Communication Networks, Computer System Implementation -
ε-Maximum Critic Deep Deterministic Policy Gradient for Multi-agent Reinforcement Learning
Springer Verlag | 2023|Keywords: Computer Science, Computer Communication Networks, Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.