Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
processing computers » processing computer, accessing computers, processing computing
function attacking » functions attacking, function tracking, function making
computers https » computing https, computers gtt, computers help
attacking https » teaching https
https function » its function, sites function, ups function
processing computers » processing computer, accessing computers, processing computing
function attacking » functions attacking, function tracking, function making
computers https » computing https, computers gtt, computers help
attacking https » teaching https
https function » its function, sites function, ups function
1
Pubblicazione 2012
Sommario:
“... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...”Testo
Elettronico
eBook
2
Pubblicazione 2015
Sommario:
“... Application -- Chapter 8. Economic Load Dispatch considering non-smooth Cost Functions Using Predator Prey...”Testo
Elettronico
eBook
3
di Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Pubblicazione 2014
Soggetti:
“...Data encryption (Computer science)....”Pubblicazione 2014
Testo
Elettronico
eBook
4
Pubblicazione 2014
Sommario:
“... -- Structural Biology of the Membrane Attack Complex -- Part III: Functional aspect -- Membrane Interactions...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”Testo
Elettronico
eBook
6
Pubblicazione 2012
Sommario:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”Testo
Elettronico
eBook
7
Pubblicazione 2014
Sommario:
“... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...”Testo
Elettronico
eBook
8
Pubblicazione 2014
Sommario:
“... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...”Testo
Elettronico
eBook
9
Pubblicazione 2015
Sommario:
“... Dust Reinforced Epoxy Composite Using Grey Relational Analysis -- Weight Computation of Alternatives...”Testo
Elettronico
eBook
10
Pubblicazione 2010
Sommario:
“... -- InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services...”Testo
Elettronico
eBook
11
Pubblicazione 2015
Sommario:
“... Modelled with Complex Objects -- Chemistry-inspired Adaptive Stream Processing -- Computing Partial...”Testo
Elettronico
eBook
12
Pubblicazione 2006
Sommario:
“...RFID, e-ID Cards, Trusted Computing, Interoperability -- Radio Frequency Identification (RFID...”Testo
Elettronico
eBook
13
Pubblicazione 2010
Sommario:
“...Computer Vision and Image Processing -- Earliest Computer Vision Systems in Poland -- VICAL: Visual...”Testo
Elettronico
eBook
14
Pubblicazione 2014
Sommario:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”Testo
Elettronico
eBook
15
Pubblicazione 2007
Sommario:
“... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...”Testo
Elettronico
eBook
16
Pubblicazione 2005
Sommario:
“... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...”Testo
Elettronico
eBook
17
Sommario:
“...1 Introduction: Geomathematical Motivation -- Part I: Auxiliary Functions -- 2 The Gamma Function...”
Testo
Testo
Elettronico
eBook
18
Pubblicazione 2014
Sommario:
“... on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System -- Improved...”Testo
Elettronico
eBook
19
Pubblicazione 2010
Sommario:
“... Selection Based on Soft Computing Techniques -- Obtaining the Compatibility between Musicians Using Soft...”Testo
Elettronico
eBook
20
Pubblicazione 2006
Sommario:
“... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...”Testo
Elettronico
eBook



