Listing 1 - 6 of 6 |
Sort by
|
Choose an application
database management --- Information systems --- Database management --- Databases --- Bases de données --- Congresses --- Gestion --- Congrès --- 681.3*H2 --- -681.3*E5 --- 681.3*H2m --- databases --- interfaces --- Data banks --- Data bases --- Databanks --- Database systems --- Computer files --- Electronic information resources --- Database management: security; integrity; protection--See also {?681.5*E5} --- Congresses. --- Files: backup/recovery; optimization; organization/structure; sorting/searching (Data) --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*E5 Files: backup/recovery; optimization; organization/structure; sorting/searching (Data) --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*E5 --- Database management - Congresses --- Databases - Congresses
Choose an application
Database management --- Bases de données --- Gestion --- Database management. --- #TCPW P4.3 --- #TCPW P4.8 --- #TCPW P4.2 --- 681.3*C4 --- 681.3*H2m --- 681.3*I62 --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Performance of systems (Computer systems organization) --- Database management: security; integrity; protection--See also {?681.5*E5} --- Simulation languages --- 681.3*I62 Simulation languages --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*C4 Performance of systems (Computer systems organization)
Choose an application
Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Information systems --- Deductive databases --- Bases de données déductives --- Deductive data bases --- Database management: security; integrity; protection--See also {?681.5*E5} --- Artificial intelligence (AI) in general; cognitive simulation; philosophical foundations --- Deduction and theorem proving: answer/reason extraction; reasoning; resolution; metatheory; mathematical induction; logic programming (Artificial intelligence) --- 681.3*I23 Deduction and theorem proving: answer/reason extraction; reasoning; resolution; metatheory; mathematical induction; logic programming (Artificial intelligence) --- 681.3*I20 Artificial intelligence (AI) in general; cognitive simulation; philosophical foundations --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Bases de données déductives --- Logic programming --- 681.3*H2m --- 681.3*H2 --- 681.3*I20 --- 681.3*I23 --- Computer programming --- Databases --- Logic Programming --- Programmation logique
Choose an application
Constraint databases. --- Information systems --- 681.3*H2m --- 681.3*H2m Database management: security integrity protection--See also {?681.5*E5} --- Database management: security integrity protection--See also {?681.5*E5} --- Constraint databases --- Bases de données de contraintes --- EPUB-LIV-FT SPRINGER-B --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Database management. --- Artificial intelligence. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Database Management. --- Artificial Intelligence (incl. Robotics). --- Programming Techniques. --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Databases --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Artificial Intelligence. --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming --- Data structures (Computer science)
Choose an application
Information systems --- #TCPW P4.0 --- #TCPW P4.5 --- 681.3*H2m --- 681.3*I30 --- 681.3*I33 --- 681.3*I34 --- Database management: security; integrity; protection--See also {?681.5*E5} --- Computerwetenschap--?*I30 --- Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I34 Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Information storage and retrieval systems. --- Computer vision. --- Information Storage and Retrieval. --- Image Processing and Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Langages de programmation --- Programmation système (informatique)
Choose an application
The ease of access, relative anonymity, and borderless nature of the Internet has allowed widespread computer-based crime – or cybercrime – to proliferate rapidly. Law enforcement and international security organizations, along with governments and the private sector, have only recently begun to appreciate the scope, severity and transnational nature of this problem. In recent years, organizations have begun to emerge and evolve in a progressively collaborative ecosystem of vested international bodies seeking to address these challenges in unique, innovative ways. This study attempts to address a series of questions regarding the current state of cyber security. What does the international landscape of cyber security look like today? What are these organizations actually doing? Are they succeeding? What measureable progress has been made in developing a supportive ecosystem of global cyber security? Are these organizations presenting practical, innovative, collaborative, and sustainable solutions to address these issues? Global Initiatives to Secure Cyberspace: An Emerging Landscape is designed for a professional audience composed of researchers, practitioners and the government, focusing on a secure cyberspace industry. Advanced-level students in computer science will also find this book suitable. .
Cartography --Data processing --Congresses. --- Computer graphics --Congresses. --- Image processing --Congresses. --- Optical data processing --Congresses. --- Computer security --- Computer networks --- Cyberterrorism --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Computer security. --- Security measures. --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- 681.3*I42 --- #TCPW P4.5 --- 681.3*I33 --- Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Database management: security integrity protection--See also {?681.5*E5} --- Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I34 Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- 681.3*H2m Database management: security integrity protection--See also {?681.5*E5} --- 681.3*I42 Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Infinite matrices. --- Summability theory. --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Information systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- #TCPW P4.0 --- #TCPW P4.2 --- 681.3*A0 --- 681.3*H2m --- 681.3*I34 --- 681.3*I34 Graphics utilities: picture desciption languages; software support (Computer graphics) --- Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- 681.3*A0 General --- General --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Operator theory --- Computer crimes --- Terrorism --- Operator theory. --- Computer graphics --- Cartography --- Infographie --- Cartographie --- Data processing --- Informatique --- Data structures (Computer scienc. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer vision. --- Models and Principles. --- Image Processing and Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Matrices. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Matrices --- Théorèmes taubériens --- Suites et series --- Sommabilite
Listing 1 - 6 of 6 |
Sort by
|