Banner

Your search returned 4 results.

Not what you expected? Check for suggestions
Traceback and anonymity / Xinyuan Wang, Douglas Reeves.

by Wang, Xinyuan (Computer scientist) | Reeves, Douglas S, 1953-.

Material type: Text Text; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Springer, c.2015Availability: Items available for loan: [Call number: 005.8 WAN] (1).

Graph-based clustering and data visualization algorithms / Ágnes Vathy-Fogarassy, Janos Abonyi.

by Vathy-Fogarassy, Ágnes | Abonyi, Janos, 1974-.

Material type: Text Text; Literary form: Not fiction ; Audience: Specialized; Publisher: London : Springer, c.2013Availability: Items available for loan: [Call number: 006.312 VAT] (1).

Building secure defenses against code-reuse attacks / Lucas Davi

by Davi, Lucas | Sadeghi, Ahmad-Reza [author.].

Material type: Text Text; Literary form: Not fiction ; Audience: Specialized; Publisher: New York Springer, 2015Availability: Items available for loan: [Call number: 005.8 DAV] (1).

Smart TV security : media playback and digital video broadcast / Benjamin Michéle.

by Michéle, Benjamin.

Material type: Text Text; Literary form: Not fiction ; Audience: Specialized; Publisher: Cham : Springer, c.2015Availability: Items available for loan: [Call number: 621.388 MIC] (1).