Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problem solution » problem solving
solution https » pollution https, sedation https, evaluation https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problem solution » problem solving
solution https » pollution https, sedation https, evaluation https
securing https » security https, security http, securing rtp
1
Table of Contents:
“... -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional Processing, Control-of-Flow...”
View full text
View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...”View full text
Electronic
eBook
3
Table of Contents:
“..., and Deadlocking -- Tables -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional...”
View full text
View full text
Electronic
eBook
4
Table of Contents:
“... -- Managing Content -- Solutions to Common PHP/Mysql Problems -- Keeping Intruders at Bay....”
View full text
View full text
Electronic
eBook
5
Subjects:
“...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...”
View full text
View full text
Electronic
eBook
6
Subjects:
“...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...”
View full text
View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“...Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack...”View full text
Electronic
eBook
9
Table of Contents:
“... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...”
View full text
View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...”View full text
Electronic
eBook
13
Table of Contents:
“... -- Multimedia -- Database Access -- Networking and Remoting -- Security and Cryptography -- Unmanaged Code...”
View full text
View full text
Electronic
eBook
14
Table of Contents:
“... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...”
View full text
View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security...”View full text
Electronic
eBook
16
by Brimhall, Jason., Brimhall, Jason., Dye, David., Roberts, Timothy., Sheffield, Wayne., Gennick, Jonathan., Sack, Joseph.
Published 2012
Subjects:
“...Database Management. https://scigraph.springernature.com/ontologies/product-market-codes/I18024...”Published 2012
View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Modification of KASUMI Type Permutations -- Provably Secure Double-Block-Length Hash Functions in a Black-Box...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... -- Computation of Equilibria and Stable Solutions -- A Geometry of Networks -- Contributed Papers -- Systematic...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... Solution to the Millionaires’ Problem Based on Homomorphic Encryption -- Non-interactive Zero-Knowledge...”View full text
Electronic
eBook



