Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing protected » processing project, processing presented, processing proteases
developing computing » developing competent, developing computer, developing coping
https developing » hits developing, steps developing, crops developing
protected https » protection https, protected crops, protected fats
processing protected » processing project, processing presented, processing proteases
developing computing » developing competent, developing computer, developing coping
https developing » hits developing, steps developing, crops developing
protected https » protection https, protected crops, protected fats
1
Published 2007
Table of Contents:
“... Evaluation of Block Ciphers -- Development of Concealing the Purpose of Processing for Programs in a...”View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“...a1. Environmental Protection Strategies: An overview -- 2. The potential of rhizospheric...”View full text
Electronic
eBook
3
Published 2011
Table of Contents:
“... -- Chapter 7 Ubiquitous computing, privacy and data protection: options and limitations to reconcile...”View full text
Electronic
eBook
4
Table of Contents:
“.... Hardware and Functional Development of Protection Devices and Systems -- 4. Fundamentals of System Analysis...”
View full text
View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“...: Are Economic Incentives Adequate? -- Government Intervention in Information Infrastructure Protection...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... for Heavy Metal Removal from Waste Water -- Modeling Carbon Mask Adsorptive Filters -- Adsorption Processes...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...”View full text
Electronic
eBook
8
Published 2015
Subjects:
“...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“... Event Correlation Architecture for SCADA Security -- Protecting Infrastructure Assets from Real-Time...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Threats to Critical Infrastructures -- Critical Information Infrastructure Protection in the Developing...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“... Critical Information Infrastructure Protection Structures in Developing Countries -- Integrity-Organization...”View full text
Electronic
eBook
12
Published 2008
Subjects:
“...Development Aid. https://scigraph.springernature.com/ontologies/product-market-codes/913040...”View full text
Electronic
eBook
13
Published 2011
Subjects:
“...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... To Process Control Systems -- Towards A Taxonomy Of Attacks Against Energy Control Systems -- Attribution...”View full text
Electronic
eBook
15
Table of Contents:
“...Introduction -- Emerging issues in healthcare -- Innovation demand -- Innovation process...”
View full text
View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... of the Baltic Sea: K. Myrberg and A. Lehmann -- 3. Introduction to Computational Fluid Dynamics and Ocean...”View full text
Electronic
eBook
17
Table of Contents:
“... to integrated safety evaluation: preventive pedestrian protection -- Methodological findings on research...”
View full text
View full text
Electronic
eBook
18
Published 2015
Subjects:
“...Nature Conservation. https://scigraph.springernature.com/ontologies/product-market-codes/U26008...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... and Gas Outburst Risk -- Development of an OLAP-Fuzzy Based Process Mining System for Quality Improvement...”View full text
Electronic
eBook
20
Table of Contents:
“...Introduction -- Chapter I - The Protection Of Personal Data: Evolution And Standards In Europe...”
View full text
View full text
Electronic
eBook



