Search Results - Lin, Herbert
- Showing 1 - 20 results of 33
- Go to Next Page
-
1
New weapon technologies & the ABM Treaty / by Lin, Herbert
Published 1988Call Number: Loading…
Located: Loading…Book Loading… -
2
Cyber Threats and Nuclear Weapons. by Lin, Herbert
Published 2021Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
3
Rights and Responsibilities of Participants in Networked Communities. by Denning, Dorothy E.
Published 1900Other Authors: “…Lin, Herbert S.…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
4
Youth, pornography and the Internet /
Published 2002Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
5
Computing the future : a broader agenda for computer science and engineering /
Published 1992Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
6
Youth, pornography and the Internet /
Published 2002Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
7
Youth, pornography and the Internet /
Published 2002Other Authors: “…Lin, Herbert…”
Call Number: Loading…Access full-text online
Located: Loading…
Book -
8
Computing the future : a broader agenda for computer science and engineering /
Published 1992Other Authors: “…Lin, Herbert…”
Call Number: Loading…
Located: Loading…Book Loading… -
9
Catalyzing inquiry at the interface of computing and biology /
Published 2005Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
10
Computational technology for effective health care : immediate steps and strategic directions /
Published 2009Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
11
Toward a safer and more secure cyberspace /
Published 2007Other Authors: “…Lin, Herbert…”
Call Number: Loading…
Located: Loading…Book Loading… -
12
Cryptography's role in securing the information society /
Published 1996Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
13
Catalyzing inquiry at the interface of computing and biology /
Published 2005Other Authors: “…Lin, Herbert…”
Call Number: Loading…
Located: Loading…Book Loading… -
14
Toward a safer and more secure cyberspace /
Published 2007Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
15
Computational technology for effective health care : immediate steps and strategic directions /
Published 2009Other Authors: “…Lin, Herbert…”
Call Number: Loading…
Located: Loading…Book Loading… -
16
Cryptography's role in securing the information society /
Published 1996Other Authors: “…Lin, Herbert…”
Call Number: Loading…Access full-text online via National Academy Press
Located: Loading…
Book -
17
Rights and Responsibilities of Participants in Networked Communities
Published 1994Other Authors: “…Lin, Herbert S.…”
Call Number: Loading…Request ERIC Document
Located: Loading…
Microfilm Book -
18
Toward a safer and more secure cyberspace /
Published 2007Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
19
A review of the FBI's trilogy information technology modernization program /
Published 2004Other Authors: “…Lin, Herbert…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
20
Cryptography's Role in Securing the Information Society. by Dam, Kenneth W.
Published 1900Other Authors: “…Lin, Herbert S.…”
Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer networks
Security measures
Computer security
Prevention
Computer crimes
Cyberterrorism
Information technology
Privacy, Right of
Government policy
Intellectual property
Law and legislation
Social aspects
Telecommunication systems
Data processing
Internet
Internet and teenagers
Internet pornography
Parenting
Terrorism
Bioinformatics
Biology
Computational biology
Computer science
Cryptography
Elections
Electronic voting
Engineering
Information warfare
Internet and children
Medical care