From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Teaching security best practices by architecting and administering an IT security lab., и . SIGITE Conference, стр. 182-187. ACM, (2004)An isolated, multi-platform network sandbox for teaching IT security system engineers., и . SIGITE Conference, стр. 19-23. ACM, (2004)Comparison of TwoVirtual education labs: Closing the gap between online and brick-and-mortar schools., и . ITHET, стр. 1-7. IEEE, (2013)A Trellis for Novice AI Practitioners., и . ITHET, стр. 1-9. IEEE, (2019)Database modeling with Object Relationship Schema., , , и . ITHET, стр. 1-7. IEEE, (2013)The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems., , , и . SIGITE Conference, стр. 177-181. ACM, (2004)Real-time display of computer generated half-tone perspective pictures., , и . IFIP Congress (2), стр. 973-978. (1968)Half-tone perspective drawings by computer., , , и . AFIPS Fall Joint Computing Conference, том 31 из AFIPS Conference Proceedings, стр. 49-58. AFIPS / ACM / Thomson Book Company, Washington D.C., (1967)Integration of Services Computing Curricula in Information Technology., , , и . SERVICES I, стр. 41-45. IEEE Computer Society, (2008)Protection methods against IP packet attacks., и . SIGITE Conference, стр. 276. ACM, (2004)