Books on the topic 'Software and hardware security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Software and hardware security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Raj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.
Find full textInc, ebrary, ed. Zabbix 1.8 network monitoring: Monitor your network's hardware, servers, and Web performance effectively and efficiently. Birmingham, U.K: Packt Pub., 2010.
Find full textMadden, Wayne. Implementing AS/400 security. Loveland, Colo: Duke Press, 1992.
Find full textMadden, Wayne. Implementing AS/400 security. 2nd ed. Loveland, Colo: Duke Press, 1995.
Find full textCarol, Woodbury, ed. Implementing AS/400 security. 3rd ed. Loveland Colo: Duke Press, 1998.
Find full textPascal, Paillier, and Verbauwhede Ingrid, eds. Cryptographic hardware and embedded systems - CHES 2007: 9th international workshop, Vienna, Austria, September 10-13, 2007 ; proceedings. Berlin: Springer, 2007.
Find full text1971-, Jones Don, ed. Microsoft Windows server 2003 security administrator's companion. Redmond, Wash: Microsoft Press, 2003.
Find full textPatrick, Schaumont, and SpringerLink (Online service), eds. Cryptographic Hardware and Embedded Systems – CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textChristophe, Clavier, and Gaj Kris, eds. Cryptographic hardware and embedded systems - CHES 2009: 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings. Berlin: Springer, 2009.
Find full textEcker, Wolfgang, Wolfgang Müller, and Rainer Dömer, eds. Hardware-dependent Software. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-1-4020-9436-1.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textFedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.
Full textBenjamin, Zee, ed. Computer hardware/software architecture. Englewood Cliffs, N.J: Prentice-Hall, 1986.
Find full textM, Sibigtroth James, ed. Software and hardware engineering. New York: Oxford University Press, 2000.
Find full textGorsline, G. W. Computer organization: Hardware/software. 2nd ed. Englewood Cliffs, N.J: Prentice-Hall, 1986.
Find full textGorsline, George W. Computer organization: Hardware/software. 2nd ed. London: Prentice-Hall, 1986.
Find full textCady, Fredrick M. Software and hardware engineering. New York: Oxford University Press, 1997.
Find full textMicheli, Giovanni, and Mariagiovanna Sami, eds. Hardware/Software Co-Design. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/978-94-009-0187-2.
Full textTeich, Jürgen. Digitale Hardware/Software-Systeme. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-662-06740-6.
Full textHaubelt, Christian, and Jürgen Teich. Digitale Hardware/Software-Systeme. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-05356-6.
Full textSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textGrunwald, Dirk C. Benchmarking hypercube hardware and software. Urbana, Ill: Dept. of Computer Science, University of Illinois at Urbana-Champaign, 1986.
Find full textill, Lund Tom, ed. Inside computers: Hardware and software. Minneapolis, Minn: Dillon Press, 1986.
Find full textTierney, John E. Microcomputer systems: Hardware and software. Bromley: Chartwell-Bratt, 1989.
Find full textKain, Richard Y. Computer architecture: Software and hardware. Hemel Hempstead: Prentice-Hall, 1989.
Find full textKeates, Anita. Apple Macintosh: Hardware and software. 3rd ed. Hull: Dyslexia Computer Resource Centre, 1997.
Find full textMicrocomputer organization: Hardware and software. New York: Macmillan Pub., 1985.
Find full textKain, Richard Y. Computer architecture: Software and hardware. Englewood Cliffs, N.J: Prentice Hall, 1989.
Find full textM, Rooney Victor, ed. Microprocessor hardware and software concepts. New York: Macmillan, 1987.
Find full textKeates, Anita. Apple Macintosh: Hardware and software. 2nd ed. Hull: Dyslexia Computer Resource Centre, 1996.
Find full textRehman, Semeen, Muhammad Shafique, and Jörg Henkel. Reliable Software for Unreliable Hardware. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25772-3.
Full textHa, Soonhoi, and Jürgen Teich, eds. Handbook of Hardware/Software Codesign. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-017-7358-4.
Full textJaulent, Patrick. The 68000 Hardware and Software. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-07763-2.
Full textBelous, Anatoly, and Vitali Saladukha. Viruses, Hardware and Software Trojans. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4.
Full textOu, Jingzhao. Energy efficient hardware-software co-synthesis using reconfigurable hardware. Boca Raton, Fla: Chapman & Hall/CRC, 2009.
Find full textOu, Jingzhao. Energy efficient hardware: Software co-synthesis using reconfigurable hardware. Boca Raton, Fla: Chapman & Hall/CRC, 2009.
Find full textSingh, Arun Kumar, and Balwinder Raj. Nanoelectronic Devices for Hardware and Software Security. Taylor & Francis Group, 2021.
Find full textSingh, Arun Kumar, and Balwinder Raj. Nanoelectronic Devices for Hardware and Software Security. Taylor & Francis Group, 2021.
Find full textSingh, Arun Kumar, and Balwinder Raj. Nanoelectronic Devices for Hardware and Software Security. Taylor & Francis Group, 2021.
Find full textNanoelectronic Devices for Hardware and Software Security. Taylor & Francis Group, 2021.
Find full textBlack Hat Physical Device Security: Exploiting Hardware and Software. Syngress, 2004.
Find full textMiller, Drew. Black Hat Physical Device Security: Exploiting Hardware and Software. Elsevier Science & Technology Books, 2005.
Find full textComputer Networking for LANs to WANs: Hardware, Software and Security, International Edition. Delmar Cengage Learning, 2009.
Find full textAntonakos, James L., and Mansfield Jr Kenneth C. Bundle : Computer Networking for LANS to WANS : Hardware, Software and Security + Hands-On Microsoft® Windows® Server 2008 Administration : Computer Networking for LANS to WANS: Hardware, Software and Security + Hands-On Microsoft® Windows® Server 2008 Administration. Delmar Cengage Learning, 2009.
Find full textImplementing AS/400 security. Duke Press, 2000.
Find full textHefner, Joe. Ethics Guide on Computer Information and Technology: Hardware, Software, Internet, Cloud Computing, Networks, Computer Security, Databases, ... Intelligence, File Management and Programming. Independently Published, 2021.
Find full textMadden, Wayne, and Carol Woodbury. Implementing AS/400 Security, 4th Edition. 4th ed. 29th Street Press, 2000.
Find full text