Alternatives de cerca:
architecture applications » architecture exhibitions, architecture evaluation, architecture education
applications security » applications series
security guides » security guide, security's guide, security games
1
Publicat 2015
Matèries: ...Computer security....
Obtenir text complet
Electrònic eBook
2
Taula de continguts: ... -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security...
Obtenir text complet
Electrònic eBook
3
Taula de continguts: ...Web Service Technologies, Principles, Architectures, and Standards -- Web Services Threats...
Obtenir text complet
Electrònic eBook
4
Taula de continguts: ... Architectures for Group Communication -- Part IV: Related Technologies -- Security Options for Distributed...
Obtenir text complet
Electrònic eBook
5
Publicat 2013
Taula de continguts: ...-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled...
Obtenir text complet
Electrònic eBook
6
Publicat 2011
Taula de continguts: ...-to-Peer Grid Computing -- Peer4Peer: E-science Communities for Overlay Network and Grid Computing Research...
Obtenir text complet
Electrònic eBook
7
per Faircloth, Jeremy.
Publicat 2014
Taula de continguts: ... Servers Databases Information Security Architecture Enterprise Applications Administration Teams...
Llibre
8
Publicat 2010
Taula de continguts: ... for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building Scientific...
Obtenir text complet
Electrònic eBook
9
Taula de continguts: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
Obtenir text complet
Electrònic eBook
10
Matèries: ...Data encryption (Computer science)....
Obtenir text complet
Electrònic eBook
11
Publicat 2008
Taula de continguts: ... Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing...
Obtenir text complet
Electrònic eBook
12
Matèries: ...Mobile computing....
Obtenir text complet
Electrònic eBook
13
per Huff, Brian., Huff, Brian.
Publicat 2006
Taula de continguts: ...Architecture -- Using HCSTs -- Using JSPs and Servlets in Stellent -- Using HCSPs and HCSFs...
Obtenir text complet
Electrònic eBook
14
Taula de continguts: ... Applications -- Load Balancing and Replication -- Security in Peer-to-Peer Networks -- Trust and Reputation...
Obtenir text complet
Electrònic eBook
15
Publicat 2014
Taula de continguts: ... -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management...
Obtenir text complet
Electrònic eBook
16
Taula de continguts: ... -- Service Types and Transports -- Advanced Messaging Topics -- Reporting and Monitoring -- SOA Security...
Obtenir text complet
Electrònic eBook
17
Matèries: ...Computer security....
Obtenir text complet
Electrònic eBook
18
Matèries: ...Computers....
Obtenir text complet
Electrònic eBook
19
Publicat 2014
Taula de continguts: ... Security Technologies of Cloud Computing Platforms -- The Measurement and Analysis of Software Engineering...
Obtenir text complet
Electrònic eBook
20
per Gomaa, Hassan.
Publicat 2011
Taula de continguts: ...: emergency monitoring system; 24. Real-time software architecture case study: automated guided vehicle system...
Cover image
Llibre