Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
Post anesthesia nursing --- Recovery rooms --- Anesthesia Recovery Period --- Perioperative Nursing --- Postoperative Care --- Postoperative Period --- Recovery Room
Choose an application
Sea turtles --- Habitat conservation --- Wildlife management --- Wildlife recovery --- Habitat --- Planning.
Choose an application
Felidae --- Felidae --- Ocelot --- Ocelot --- Endangered species --- Endangered species --- Rare mammals --- Rare mammals --- Wildlife recovery --- Wildlife recovery --- Planning. --- Planning.
Choose an application
guide --- former cultists and their families --- step-by-step approach --- practical advice --- recovery
Choose an application
cults --- mind control --- former cult members --- recrutement practices --- psychological manipulation --- the Unification Church --- cult psychology --- strategies for recovery --- Lifton
Choose an application
Pompe à chaleur --- Heat pumps --- Économie d'énergie --- Energy conservation --- Échange d'énergie --- energy exchange --- Récupération de chaleur --- Heat recovery --- Réfrigération --- Refrigeration --- #KVIV:BB --- 621.577 --- 621.577 Heat pumps --- Recovery of waste heat --- Waste heat recovery --- Cogeneration of electric power and heat --- Heat engineering --- Heat regenerators --- Waste heat --- Congresses --- Refrigeration and refrigerating machinery --- Refrigeration. --- Installation pilote
Choose an application
This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre-1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography.
Access controls --- Auditing --- Bibliography --- Communications security --- Computer crime --- Computer security --- Confidentiality --- Cryptography --- Disaster recovery --- Integrity --- Privacy --- Risk management --- Trusted computing base
Choose an application
Computer software --- Logiciels --- Testing. --- Essais --- -681.3*D25 --- Software, Computer --- Computer systems --- Testing --- Testing and debugging: diagnostics; dumps; error handling and recovery; monitors; symbolic execution; test data generators; tracing (Software engineering) --- 681.3*D25 Testing and debugging: diagnostics; dumps; error handling and recovery; monitors; symbolic execution; test data generators; tracing (Software engineering) --- 681.3*D25
Choose an application
681.3*D24 --- 681.3*D25 --- Program verification: assertion checkers; correctness proofs; reliability; validation (Software engineering)--See also {681.3*F31} --- Testing and debugging: diagnostics; dumps; error handling and recovery; monitors; symbolic execution; test data generators; tracing (Software engineering) --- 681.3*D25 Testing and debugging: diagnostics; dumps; error handling and recovery; monitors; symbolic execution; test data generators; tracing (Software engineering) --- 681.3*D24 Program verification: assertion checkers; correctness proofs; reliability; validation (Software engineering)--See also {681.3*F31}
Choose an application
bestandsorganisatie --- 681.3*D43 --- 681.3*E5 --- 681.3*H32 --- bestandsbeheer --- bestandsmanagement --- 681.3*H32 Information storage: file organization; record classification --- Information storage: file organization; record classification --- 681.3*E5 Files: backup/recovery; optimization; organization/structure; sorting/searching (Data) --- Files: backup/recovery; optimization; organization/structure; sorting/searching (Data) --- 681.3*D43 File systems management: access methods; directory structures; distributed file systems; file organization; maintenance (Operating systems)--See also {681.3*E5} --- File systems management: access methods; directory structures; distributed file systems; file organization; maintenance (Operating systems)--See also {681.3*E5} --- Information systems --- dataprocessing --- informatica
Listing 1 - 10 of 21 | << page >> |
Sort by
|