Computer Graphics -- methods : Diagrammatic representation and inference : 6th international conference, Diagrams 2010, Portland, OR, USA, August 9-11, 2010 : proceedings / Ashok K. Goel, Mateja Jamnik, N. Hari Narayanan (eds.)
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Here are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device
A type of MICROCOMPUTER, sometimes called a personal digital assistant, that is very small and portable and fitting in a hand. They are convenient to use in clinical and other field situations for quick data management. They usually require docking with MICROCOMPUTERS for updates
Here are entered works on the human factors in computer systems. Works on computer systems operating in a real-time environment are entered under Interactive computer systems