Search alternatives:
architecture applications » architecture exhibitions, architecture evaluation, architecture education
applications security » applications series
1
Published 2015
Subjects: ...Computer security....
View full text
Electronic eBook
2
Table of Contents: ... -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security...
View full text
Electronic eBook
3
Table of Contents: ...Web Service Technologies, Principles, Architectures, and Standards -- Web Services Threats...
View full text
Electronic eBook
4
by Faircloth, Jeremy.
Published 2014
Table of Contents: ... Servers Databases Information Security Architecture Enterprise Applications Administration Teams...
Book
5
Table of Contents: ... Architectures for Group Communication -- Part IV: Related Technologies -- Security Options for Distributed...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ...-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled...
View full text
Electronic eBook
7
Published 2011
Table of Contents: ...-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building Scientific...
View full text
Electronic eBook
9
Table of Contents: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
View full text
Electronic eBook
10
Subjects: ...Data encryption (Computer science)....
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing...
View full text
Electronic eBook
12
Subjects: ...Mobile computing....
View full text
Electronic eBook
13
by Huff, Brian., Huff, Brian.
Published 2006
Table of Contents: ...Architecture -- Using HCSTs -- Using JSPs and Servlets in Stellent -- Using HCSPs and HCSFs...
View full text
Electronic eBook
14
Table of Contents: ... Applications -- Load Balancing and Replication -- Security in Peer-to-Peer Networks -- Trust and Reputation...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management...
View full text
Electronic eBook
16
Table of Contents: ... -- Service Types and Transports -- Advanced Messaging Topics -- Reporting and Monitoring -- SOA Security...
View full text
Electronic eBook
17
Subjects: ...Computer security....
View full text
Electronic eBook
18
Subjects: ...Computers....
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... Security Technologies of Cloud Computing Platforms -- The Measurement and Analysis of Software Engineering...
View full text
Electronic eBook
20
by Gomaa, Hassan.
Published 2011
Table of Contents: ...: emergency monitoring system; 24. Real-time software architecture case study: automated guided vehicle system...
Cover image
Book