Spelling suggestions: "subject:"computer software. computer security."" "subject:"computer software. coomputer security.""
1 |
Technological enhancements for personal computersFuller, Marvin G. January 1992 (has links)
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992. / Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
|
2 |
Novel techniques for implementing tamper-resistant softwareLee, Chun-to, Michael, January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2004. / Also available in print.
|
3 |
Understanding malware autostart techniques with web data extraction /Gottlieb, Matthew. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 44-45).
|
4 |
Quantitative risk assessment model for software security in the design phase of software developmentMkpong-Ruffin, Idongesit Okon. Umphress, David A. Hamilton, John A. January 2009 (has links)
Dissertation (Ph.D.)--Auburn University, 2009. / Abstract. Includes bibliographic references (p.78-83).
|
5 |
AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /Ma, Wenjun. January 2007 (has links)
Thesis (M.S.)--Georgia State University, 2007. / Title from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
|
Page generated in 0.1154 seconds