Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing developing » forecasting developing, housing developing
developing computers » developing computer, developing competent, developing competence
security processing » security proceeding, securities processing, security proceedings
computers https » computing https, computers gtt, computers help
processing developing » forecasting developing, housing developing
developing computers » developing computer, developing competent, developing competence
security processing » security proceeding, securities processing, security proceedings
computers https » computing https, computers gtt, computers help
1
Published 2010
Table of Contents:
“... without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“...Invited Talks -- Automating Security Configuration and Administration: An Access Control...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“...I CSA -- 1 Mobile and ubiquitous computing -- 2 Dependable, reliable and autonomic computing -- 3...”View full text
Electronic
eBook
9
Published 2012
Table of Contents:
“...Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“...Wireless sensor networks -- Cloud computing -- Wireless communication -- Antenna design -- Signal...”View full text
Electronic
eBook
11
Published 2010
Subjects:
“...Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market...”View full text
Electronic
eBook
12
Table of Contents:
“...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...”
View full text
View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... -- Security Requirements Specification in Process-aware Information Systems -- Privacy, Data Protection...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“...Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy...”View full text
Electronic
eBook
16
17
Published 2015
Table of Contents:
“... the Efficiency of Cloud Computing -- Chapter 12. Object Oriented Modeling of IDEA for E-learning Security...”View full text
Electronic
eBook
18
Published 2013
Table of Contents:
“... for Enhancing the Security of Information Content of an Image -- Recognition of Limited Vocabulary Kannada Words...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Typology for Modeling Processes in Clinical Guidelines and Protocols -- How Process Helps You in Developing...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... - an Information Retrieval Approach -- Mereotopological Analysis of Formal Concepts in Security Ontologies -- 2...”View full text
Electronic
eBook



