Search alternatives:
computer crimes » computer games
computer timed » computer time, compute time, computers time
crimes designs » crime design, crises design, curious designs
timed designs » timed design, aided designs, time design

1
Published 1986
Springer Berlin Heidelberg
Table of Contents: ...-Effective Design of a Computer-Based System --...

2
by Tornhill, Adam
Published 2018
Pragmatic Bookshelf
Table of Contents: ... the Technical-Debt Trap -- Exercises -- 3. Coupling in Time: A Heuristic for the Concept of Surprise -- Uncover...

3
Published 2016
Springer India
Table of Contents: .... Design New Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the Statistical...

4
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Covering Arrays Using a Grid -- Impact of Algorithm Design in Implementing Real-Time Active Control Systems...

5
Published 2022
Springer International Publishing
Subjects: ...Computer crimes...

6
by Shema, Mike
Published 2012
Syngress
Table of Contents: ... injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies...

7
Published 2017
Springer International Publishing
Table of Contents: ...Detection of faults in induction motors using texture-based features and fuzzy inference -- Time...

8
Published 2021
Springer International Publishing
Table of Contents: ... and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need...

9
by Cappelli, Dawn
Published 2012
Addison-Wesley
Subjects: ...Computer crimes / Prevention...

10
Published 2023
John Wiley & Sons, Inc.
Table of Contents: ... The Architecture of QC -- 17.6 Quantum Algorithm -- 17.7 Design Limitations of Quantum Computer -- 17.8 Different...

11
Published 2021
CRC Press
Table of Contents: ... Edge Computing and Caching -- 12.1 Introduction -- 12.1.1 Chapter Roadmap -- 12.2 Literature Review...

12
Published 2023
Springer International Publishing
Table of Contents: ...-time Sensor Attack Detection for Cyber-physical Systems -- Part. III. AI/ML for Cyber Analysis...

13
by SAPV, Tharrmashastha, Bera, Debajyoti, Maitra, Arpita, Maitra, Subhamoy
Published 2021
Springer Nature Singapore
Subjects: ...Computer crimes...

14
by Patton, Helen E.
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...? -- Should I manage people? -- How can I deal with impostor syndrome? -- How can I know if it's time to move...

15
Published 2019
Springer International Publishing
Table of Contents: ... Tensor-based Representations from Brain-Computer Interface Data for Cybersecurity -- ADS Health -- Can We...

16
Published 2021
Springer International Publishing
Table of Contents: ... for European Digital Sovereignty: Building Europe’s technological independence in times of geopolitical rivalry...

17
Published 2024
Springer Nature Singapore
Table of Contents: ...Chapter 1: Analytics of Machine Learning in Healthcare Industries -- Chapter 2: Design...

18
Published 2024
Springer Nature Singapore
Table of Contents: ... Machine-Learning techniques -- Ethereum Blockchain Based KYC Verification -- Crime Rate Prediction Using...

19
Published 2016
Springer Nature Singapore
Table of Contents: ... Approach -- Chapter 35. Computerized Evaluation of Subjective Answers Using Hybrid Technique -- Chapter 36...

20
Published 2022
Springer Nature Singapore
Table of Contents: ... the COVID-19 pandemic -- Impact of Security in Blockchain based Real Time Applications -- An Evaluative...