by
Smith, Sean W. author.
Format:
Electronic Resources
Excerpt:
longer history of amplifying small amounts of hardware security into broader system security---and
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the
View Other Search Results
by
Salomon, David. author.
Format:
Electronic Resources
Excerpt:
underlying theory, history, vocabulary, and concepts that drive this pivotal area of computer science. With
by
Kizza, Joseph Migga. author.
Format:
Electronic Resources
Excerpt:
infrastructure (NEW chapter) • Surveys the history of computing and the evolution of computer crimes • Explores
Limit Search Results
Narrowed by: