1
Published 2010
Table of Contents: ... without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ...Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Invited Talks -- Automating Security Configuration and Administration: An Access Control...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ...I CSA -- 1 Mobile and ubiquitous computing -- 2 Dependable, reliable and autonomic computing -- 3...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ...Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ...Wireless sensor networks -- Cloud computing -- Wireless communication -- Antenna design -- Signal...
View full text
Electronic eBook
11
Published 2010
Subjects: ...Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
12
Table of Contents: ...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... -- Security Requirements Specification in Process-aware Information Systems -- Privacy, Data Protection...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ...Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy...
View full text
Electronic eBook
16
Published 2011
Subjects: ...Computer security....
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... the Efficiency of Cloud Computing -- Chapter 12. Object Oriented Modeling of IDEA for E-learning Security...
View full text
Electronic eBook
18
Published 2013
Table of Contents: ... for Enhancing the Security of Information Content of an Image -- Recognition of Limited Vocabulary Kannada Words...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Typology for Modeling Processes in Clinical Guidelines and Protocols -- How Process Helps You in Developing...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... - an Information Retrieval Approach -- Mereotopological Analysis of Formal Concepts in Security Ontologies -- 2...
View full text
Electronic eBook