Books on the topic 'Software and hardware protection methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 books for your research on the topic 'Software and hardware protection methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Dedicated digital processors: Methods in hardware/software system design. Chichester, West Sussex, England: John Wiley, 2004.
Find full textPratt, Terrence W. Methods for design and evaluation of integrated hardware/software sytems for concurrent computation. Charlottesville, VA: Dept. of Computer Science, University of Virginia, 1987.
Find full textWagstaff, Adam. Health equity and financial protection: Streamlined analysis with ADePT software. Washington, D.C: World Bank, 2011.
Find full textF, Li Hon, Probst D. K, and IFIP WG 10 5, eds. Advances in hardware design and verification: IFIP TC10 WG10.5 International Conference on Correct Hardware and Verification Methods, 16-18 October 1997, Montreal, Canada. London: Chapman & Hall on behalf of the International Federation for Information Processing (IFIP), 1997.
Find full textDavid, Hutchison. Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textSchneider, Jochen. Handbuch des EDV-Rechts: Vertragsrecht (Hardware, Software, Wartung, Pflege, Systeme jeweils mit AGB), Gewährleistung, Haftung, Online, Datenschutz, Rechtsschutz. 2nd ed. Köln: O. Schmidt, 1997.
Find full textAdvanced Research Working Conference on Correct Hardware Design Methodologies (1993 Arles, France). Correct hardware design and verification methods: IFIP WG10.2 Advanced Research Working Conference, CHARME '93, Arles, Frances [sic], May 24-26, 1993 : proceedings. Berlin: Springer, 1993.
Find full textInternational School on Formal Methods for the Design of Computer, Communication, and Software Systems (6th 2006 Bertinoro, Italy). Formal methods for hardware verification: 6th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2006, Bertinoro, Italy, May 22-27, 2006 : advanced lectures. Berlin: Springer, 2006.
Find full textPreneel, Bart. Cryptographic Hardware and Embedded Systems – CHES 2011: 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings. Berlin, Heidelberg: International Association for Cryptologic Research, 2011.
Find full textE-patent strategies for software, e-commerce, the internet, telecom services, financial services, and business methods (with case studies and forecasts). Washington, DC: LBI Institute, 2000.
Find full textGrigorev, Anatoliy. Methods and algorithms of data processing. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/22119.
Full textChristophe, Clavier, and Gaj Kris, eds. Cryptographic hardware and embedded systems - CHES 2009: 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings. Berlin: Springer, 2009.
Find full textGrigor'ev, Anatoliy, and Evgeniy Isaev. Methods and algorithms of data processing. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1032305.
Full textPatrick, Schaumont, and SpringerLink (Online service), eds. Cryptographic Hardware and Embedded Systems – CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textCatherine, Skintik, ed. Microsoft PowerPoint 2000 complete tutorial. Cincinnati, OH: South-Western Computer Education, 2000.
Find full textPeter, Daniel, and SpringerLink (Online service), eds. Computer Safety, Reliability, and Security: 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textLogachev, Vladimir, Aleksandr Pastukhov, Viktor Korneev, Igor Kravchenko, Mikhail Erofeev, Aleksandr Kolomeychenko, and Dmitriy Petrovskiy. Basics of patent. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/21945.
Full textMayer-Lindenberg, F. Dedicated Digital Processors: Methods in Hardware/Software Co-Design. Wiley, 2004.
Find full textMayer-Lindenberg, F. Dedicated Digital Processors: Methods in Hardware/Software Co-Design. Wiley & Sons, Incorporated, John, 2007.
Find full textInternational Computers in Engineering Conference and Exhibit. Computers in Engineering, 1985: Applications, Software and Hardware, Computer Methods, Special Topics. Amer Society of Mechanical, 1985.
Find full textInternational Conference on Correct Hardware and Verification Methods (1997 Montréal, Québec). Advances in hardware design and verification: IFIP TC10 WG10.5 International Conference on Correct Hardware and Verification Methods, 16-18 October 1997, Montreal Canada. 1997.
Find full textEinstein, Andrew J. Radiation Considerations. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199392094.003.0034.
Full textEnvironmental modeling: Computer methods and software for simulating environmental pollution and its adverse effects. Elsevier Applied Science, 1993.
Find full textP, Zannetti, ed. Environmental modeling: Computer methods and software for simulating environmental pollution and its adverse effects. Southampton: Computational Mechanics Publications, 1993.
Find full text(Editor), Marco Bernardo, and Alessandro Cimatti (Editor), eds. Formal Methods for Hardware Verification: 6th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM ... Lectures (Lecture Notes in Computer Science). Springer, 2006.
Find full textGlazier, Stephen C. e-Patent Strategies for Software, e-Commerce, the Internet, Telecom Services, Financial Services, and Business Methods (with Case Studies and Forecasts). Lbi (Law & Business Institute), 2000.
Find full textGlazier, Stephen C. e-Patent Strategies for Software, e-Commerce, the Internet, Telecom Services, Financial Services, and Business Methods (with Case Studies and Forecasts). L B I Law & Business Institute, 2000.
Find full textSystem Specification And Design Languages. Springer, 2011.
Find full textPasewark, Bill, and Skintik Skintik. Microsoft PowerPoint 2000: Complete Tutorial. Course Technology, 2000.
Find full textMorrow, Jean, Dusti D. Howell, Deanne K. Howell, Jennifer B. Summerville, and Armand Seguin. Using PowerPoint in the Classroom. Corwin Press, 2002.
Find full textDusti, Howell, ed. Using PowerPoint in the classroom. Thousand Oaks, Calif: Corwin Press, 2002.
Find full textVaidhyanathan, Siva. 3. Patents and their discontents. Oxford University Press, 2017. http://dx.doi.org/10.1093/actrade/9780195372779.003.0003.
Full textUnger, Herwig, and Wolfgang A. Halang, eds. Autonomous Systems 2016. VDI Verlag, 2016. http://dx.doi.org/10.51202/9783186848109.
Full textPrimiero, Giuseppe. On the Foundations of Computing. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198835646.001.0001.
Full textDorfman, Jay. Theory and Practice of Technology-Based Music Instruction. Oxford University Press, 2013. http://dx.doi.org/10.1093/oso/9780199795581.001.0001.
Full textHughes, Jim. Introduction to Intra-Operative and Surgical Radiography. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198813170.001.0001.
Full text