-
161
-
162
-
163
Digital battlefield bot armies and weapons of mass suasion
izdano v Philippine Graphic (2016)Article -
164
-
165
Case studies in secure computing achievements and trends
Izdano 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
166
Cyber and electromagnetic threats in modern relay protection
Izdano 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
167
Hardware security design, threats, and safeguards
Izdano 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
168
Secure development for mobile apps how to design and code secure mobile applications with PHP and JavaScript
Izdano 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
169
-
170