Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction --subdivision Security measures under names of individual computers, networks, and systems, e.g. IBM computers--Security measures
1
Computer systems -- Purchasing : Buying, Supporting, Maintaining Software and Equipment : an IT Manager's Guide to Controlling the Product Lifecycle
2014
1
Computer systems -- Quality control. : Meta-algorithmics : patterns for robust, low cost, high quality systems / Steven J. Simske, HP Labs, Colorado, USA
Computer systems -- Reliability -- Research. : Dependable systems : software, computing, networks : research results of the DICS program / Jürg Kohlas, Bertrand Meyer, André Schiper (eds.)
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction --subdivision Security measures under names of individual computers, networks, and systems, e.g. IBM computers--Security measures
1
Computer systems -- Simulation methods -- Congresses. : Model-based safety and assessment : 4th International Symposium, IMBSA 2014, Munich, Germany, October 27-29, 2014 : proceedings / Frank Ortmeier, Antoine Rauzy (Eds.)
2014
1
Computer systems -- Social aspects. : From sociology to computing in social networks : theory, foundations and applications / Nasrullah Memon, Reda Alhajj, editors
Computer Systems -- trends. : Information and communication technologies for active ageing : opportunities and challenges for the European Union / edited by Marcelino Cabrera and Norbert Malanowski
A type of MICROCOMPUTER, sometimes called a personal digital assistant, that is very small and portable and fitting in a hand. They are convenient to use in clinical and other field situations for quick data management. They usually require docking with MICROCOMPUTERS for updates