• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 678
  • 144
  • 138
  • 131
  • 26
  • 22
  • 13
  • 13
  • 13
  • 13
  • 13
  • 12
  • 8
  • 7
  • 2
  • Tagged with
  • 1289
  • 1289
  • 1289
  • 468
  • 326
  • 265
  • 265
  • 263
  • 261
  • 261
  • 261
  • 261
  • 261
  • 261
  • 261
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Techniques for the evaluation and improvement of computer-produced abstracts.

Mathis, Betty Ann January 1972 (has links)
No description available.
272

Languages for specifying protection requirements in data base systems - a semantic model /

Hartson, H. Rex January 1975 (has links)
No description available.
273

Design of event-driven protection mechanisms /

Cohen, David January 1977 (has links)
No description available.
274

Performance analysis of the distributed loop computer network /

Babi?, Gojko A. January 1978 (has links)
No description available.
275

Integration of data processing concepts in the secondary and post-secondary vocational programs in the state of Alabama /

Franklin, Patricia Ann January 1978 (has links)
No description available.
276

Design and analysis of the Distributed Double-Loop Computer Network (DDLCN) /

Wolf, Jacob J. January 1979 (has links)
No description available.
277

Security in Automatic Data Processing Systems

Mendez, Eduardo G. 01 January 1976 (has links) (PDF)
Security in automatic data processing systems is concerned with the protection of equipment and data against unauthorized modifications or destruction, and accidental or intentional disclosure of information. This report consists of two parts: 1. An overview of current literature in the field. In this part, basic problems and solutions, terminology and concepts found in the theoretical aspects of data processing systems security are described. 2. A survey of the state of art in a sample area. During the survey, information about actual applications of security methods in the Orlando, Florida area was collected. This information was gathered by means of a questionnaire and it will permit a comparative analysis between the usage of security measures in large and small firms. It is hoped that this study will provide valuable information to both the computer practitioner and management and in addition, will create an awareness of the important role that the security function plays in an organization.
278

Justification of installing 4GL in Hong Kong environment.

January 1988 (has links)
by Wu Chung Man, Ronnie. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1988. / Bibliography: leaves 43-45.
279

Security of distributed data systems

Finch, Steven D. January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
280

A model of the data processing manager in the 1980's

Cartier, Gene N January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries

Page generated in 0.2189 seconds