Categoría
Top Descargas
Iniciar sesión
Registrarse
Subir
Búsqueda
Categoría
Top Descargas
Iniciar sesión
Registrarse
Búsqueda
Home
Categories
Computer Security
Computer Security
ENPA 8/27/2014
Mathematics / Computer Science / Information Technology / Information Security / Computer Security
ENPA 12/1/2015
Mathematics / Computer Science / Information Technology / Information Security / Computer Security
ENPA 1/25/2015
Mathematics / Computer Science / Information Technology / Information Security / Computer Security
ENPA 1/26/2015
Mathematics / Computer Science / Information Technology / Information Security / Computer Security
PADUA: Parallel Architecture to Detect Unexplained Activities
Computer Science / Information Security / Computer Networks / Computer Security
UNIVERSIDAD DISTRITAL FRANCISCO JOSE DE CALDAS Implementación del Algoritmo Criptográfico RSA en Lenguaje Python
Computer Science / Computer Security
Clase 01 - Curso Hacker Ético
Information Security / Computer Security / Hacking / Ethical Hacking / Cyber Security
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing
Computer Science / Algorithms / Parallel Algorithms / Distributed Computing / Parallel Computing / Information Technology / Information Security / Computer Forensics / Forensic Science / Data Mining / Database Systems / Cybercrimes / Parallel Programming / Network Security / Computer Networks / Pattern Recognition / Wireless Sensor Networks / GPU Computing / Computer Security / Intrusion Detection Systems / Parallel Processing / GPGPU (General Purpose GPU) Programming / Compute Unified Device Architecture NVIDIA CUDA / Law Enforcement / Data Structures and Algorithms / Cybersecurity / Digital Forensics / Intrusion Detection / Massively parallel processing with CUDA / Cyber Security / Big Data / Pattern Matching / Web Log Processing / Computer Forensics for Cyberspace Crimes / Data Structures / Incident Response / Cyber Security Incident Response / Big Data Analytics / Intrusion Detection System / Big Data / Analytics / Data Mining / String Matching / Massively parallel computing / Information Technology / Information Security / Computer Forensics / Forensic Science / Data Mining / Database Systems / Cybercrimes / Parallel Programming / Network Security / Computer Networks / Pattern Recognition / Wireless Sensor Networks / GPU Computing / Computer Security / Intrusion Detection Systems / Parallel Processing / GPGPU (General Purpose GPU) Programming / Compute Unified Device Architecture NVIDIA CUDA / Law Enforcement / Data Structures and Algorithms / Cybersecurity / Digital Forensics / Intrusion Detection / Massively parallel processing with CUDA / Cyber Security / Big Data / Pattern Matching / Web Log Processing / Computer Forensics for Cyberspace Crimes / Data Structures / Incident Response / Cyber Security Incident Response / Big Data Analytics / Intrusion Detection System / Big Data / Analytics / Data Mining / String Matching / Massively parallel computing
Elizabeth Yanez CSS250 Lab01
Information Systems / Information Security / Computer Engineering / Computer Security
Elizabeth Yanez CSS250 Lab02
Information Security / Computer Networks / Computer Security
Intelligent Financial Fraud Detection: A Comprehensive Review
Computer Security And Reliability / Information Security / Data Mining / Computational Intelligence / Network Security / Fraud Detection And Prevention / Computer Security / Digital Investigation,Computer Forensics, Computer security / Information Security Management / Information Technology and Security / Financial Fraud / Fraud Detection And Prevention / Computer Security / Digital Investigation,Computer Forensics, Computer security / Information Security Management / Information Technology and Security / Financial Fraud
Co-expression of protein complexes in prokaryotic and eukaryotic hosts: experimental procedures, database tracking and case studies
Algorithms / Information Management / RNA / Computer Security / DNA repair / Biological Sciences / Computer Simulation / Escherichia coli / Case Study / Animals / Insects / Physical sciences / CHEMICAL SCIENCES / Protein Complex Detection / Very high throughput / Eukaryotic Cells / Recombinant Proteins / Structure Determination / Database System / Biological Sciences / Computer Simulation / Escherichia coli / Case Study / Animals / Insects / Physical sciences / CHEMICAL SCIENCES / Protein Complex Detection / Very high throughput / Eukaryotic Cells / Recombinant Proteins / Structure Determination / Database System
Trabajo basao en ISO 2500-2011
Information Systems / Computer Science / Software Engineering / Information Security / Computer Engineering / Computer Networks / Computer Security / Computer Networks / Computer Security
Secure key generation using an ultra-long fiber laser: transient analysis and experiment
Telecommunications / Computer Security / Lasers / Optical physics / Optical Fibers / Equipment Design / Equipment Failure Analysis / Electrical And Electronic Engineering / Equipment Design / Equipment Failure Analysis / Electrical And Electronic Engineering
Ac els-cdn com S1568494611001967 1-s2 0-S1568494611001967-main
Computer Science / Artificial Intelligence / Information Security / Machine Learning / Data Mining / Wireless Communications / Database Systems / Operations Research / Computer Networks / Numerical Analysis / Computer Security / Cryptography / Databases / Wireless Communications / Database Systems / Operations Research / Computer Networks / Numerical Analysis / Computer Security / Cryptography / Databases
Secure key generation using an ultra-long fiber laser: transient analysis and experiment
Telecommunications / Computer Security / Fiber Laser / Lasers / Transient analysis / Optical physics / Optical Fibers / Equipment Design / Equipment Failure Analysis / Electrical And Electronic Engineering / Optical physics / Optical Fibers / Equipment Design / Equipment Failure Analysis / Electrical And Electronic Engineering
«
1
2
3
4
»
Copyright © 2017 DATOSPDF Inc.