1
Published 2007
Table of Contents: ... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...
View full text
Electronic eBook
2
by Powers, David., Powers, David.
Published 2007
Table of Contents: ... -- Managing Content -- Solutions to Common PHP/Mysql Problems -- Keeping Intruders at Bay....
View full text
Electronic eBook
3
by Powers, David., Powers, David.
Published 2014
Subjects: ...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...
View full text
Electronic eBook
4
by Powers, David., Powers, David.
Published 2010
Subjects: ...Web Development. https://scigraph.springernature.com/ontologies/product-market-codes/I29050...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ...Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem...
View full text
Electronic eBook
10
by Sack, Joseph., Sack, Joseph.
Published 2006
Table of Contents: ... -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional Processing, Control-of-Flow...
View full text
Electronic eBook
11
by Sack, Joseph., Sack, Joseph.
Published 2008
Table of Contents: ..., and Deadlocking -- Tables -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional...
View full text
Electronic eBook
12
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...
View full text
Electronic eBook
13
Table of Contents: ... -- Multimedia -- Database Access -- Networking and Remoting -- Security and Cryptography -- Unmanaged Code...
View full text
Electronic eBook
14
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Modification of KASUMI Type Permutations -- Provably Secure Double-Block-Length Hash Functions in a Black-Box...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... -- Computation of Equilibria and Stable Solutions -- A Geometry of Networks -- Contributed Papers -- Systematic...
View full text
Electronic eBook
18
Subjects: ...Database Management. https://scigraph.springernature.com/ontologies/product-market-codes/I18024...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... Solution to the Millionaires’ Problem Based on Homomorphic Encryption -- Non-interactive Zero-Knowledge...
View full text
Electronic eBook