Cuardaigh malartuithe:
architecture applications » architecture exhibitions, architecture evaluation, architecture education
applications security » applications series
security guides » security guide, security's guide, security games
1
Foilsithe 2015
Ábhair: ...Computer security....
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
2
Clár Ábhair: ... -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
3
Clár Ábhair: ...Web Service Technologies, Principles, Architectures, and Standards -- Web Services Threats...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
4
Clár Ábhair: ... Architectures for Group Communication -- Part IV: Related Technologies -- Security Options for Distributed...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
5
Foilsithe 2013
Clár Ábhair: ...-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
6
Foilsithe 2011
Clár Ábhair: ...-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
7
le Faircloth, Jeremy.
Foilsithe 2014
Clár Ábhair: ... Servers Databases Information Security Architecture Enterprise Applications Administration Teams...
Leabhar
8
Foilsithe 2010
Clár Ábhair: ... for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building Scientific...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
9
Clár Ábhair: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
10
Ábhair: ...Data encryption (Computer science)....
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
11
Foilsithe 2008
Clár Ábhair: ... Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
12
Ábhair: ...Mobile computing....
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
13
le Huff, Brian., Huff, Brian.
Foilsithe 2006
Clár Ábhair: ...Architecture -- Using HCSTs -- Using JSPs and Servlets in Stellent -- Using HCSPs and HCSFs...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
14
Clár Ábhair: ... Applications -- Load Balancing and Replication -- Security in Peer-to-Peer Networks -- Trust and Reputation...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
15
Foilsithe 2014
Clár Ábhair: ... -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
16
Clár Ábhair: ... -- Service Types and Transports -- Advanced Messaging Topics -- Reporting and Monitoring -- SOA Security...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
17
Ábhair: ...Computer security....
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
18
Ábhair: ...Computers....
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
19
Foilsithe 2014
Clár Ábhair: ... Security Technologies of Cloud Computing Platforms -- The Measurement and Analysis of Software Engineering...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
20
le Gomaa, Hassan.
Foilsithe 2011
Clár Ábhair: ...: emergency monitoring system; 24. Real-time software architecture case study: automated guided vehicle system...
Cover image
Leabhar