Cerca anche:
architecture applications » architecture exhibitions, architecture evaluation, architecture education
applications security » applications series
security guides » security guide, security's guide, security games
1
Pubblicazione 2015
Soggetti: ...Computer security....
Testo
Elettronico eBook
2
Sommario: ... -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security...
Testo
Elettronico eBook
3
Sommario: ...Web Service Technologies, Principles, Architectures, and Standards -- Web Services Threats...
Testo
Elettronico eBook
4
di Birman, Kenneth P., Birman, Kenneth P.
Pubblicazione 2012
Sommario: ... Architectures for Group Communication -- Part IV: Related Technologies -- Security Options for Distributed...
Testo
Elettronico eBook
5
Pubblicazione 2013
Sommario: ...-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled...
Testo
Elettronico eBook
6
Pubblicazione 2011
Sommario: ...-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research...
Testo
Elettronico eBook
7
di Faircloth, Jeremy.
Pubblicazione 2014
Sommario: ... Servers Databases Information Security Architecture Enterprise Applications Administration Teams...
Libro
8
Pubblicazione 2010
Sommario: ... for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building Scientific...
Testo
Elettronico eBook
9
Sommario: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
Testo
Elettronico eBook
10
Soggetti: ...Data encryption (Computer science)....
Testo
Elettronico eBook
11
Pubblicazione 2008
Sommario: ... Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing...
Testo
Elettronico eBook
12
di Gunasekera, Sheran., Gunasekera, Sheran.
Pubblicazione 2012
Soggetti: ...Mobile computing....
Testo
Elettronico eBook
13
di Huff, Brian., Huff, Brian.
Pubblicazione 2006
Sommario: ...Architecture -- Using HCSTs -- Using JSPs and Servlets in Stellent -- Using HCSPs and HCSFs...
Testo
Elettronico eBook
14
Sommario: ... Applications -- Load Balancing and Replication -- Security in Peer-to-Peer Networks -- Trust and Reputation...
Testo
Elettronico eBook
15
Pubblicazione 2014
Sommario: ... -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management...
Testo
Elettronico eBook
16
Sommario: ... -- Service Types and Transports -- Advanced Messaging Topics -- Reporting and Monitoring -- SOA Security...
Testo
Elettronico eBook
17
Soggetti: ...Computer security....
Testo
Elettronico eBook
18
di Harkins, Malcolm., Harkins, Malcolm.
Pubblicazione 2013
Soggetti: ...Computers....
Testo
Elettronico eBook
19
Pubblicazione 2014
Sommario: ... Security Technologies of Cloud Computing Platforms -- The Measurement and Analysis of Software Engineering...
Testo
Elettronico eBook
20
di Gomaa, Hassan.
Pubblicazione 2011
Sommario: ...: emergency monitoring system; 24. Real-time software architecture case study: automated guided vehicle system...
Cover image
Libro