Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing securities » processing security, processing series, processing facilities
developing computing » developing competent, developing computer, developing coping
securities https » security https
https developing » hits developing, steps developing, crops developing
processing securities » processing security, processing series, processing facilities
developing computing » developing competent, developing computer, developing coping
securities https » security https
https developing » hits developing, steps developing, crops developing
1
Table of Contents:
“...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...Wireless sensor networks -- Cloud computing -- Wireless communication -- Antenna design -- Signal...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“...Chapter I - Information Systems Development -- Rule Based Approach for Ensuring Consistency...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... -- Security Requirements Specification in Process-aware Information Systems -- Privacy, Data Protection...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy...”View full text
Electronic
eBook
8
9
Published 2012
Table of Contents:
“...Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... to Capture Secure Document Processing Requirements -- PKi Consolidation Project and Multiapplicative Smart...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“...Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“...Part I: Energy Security -- Chapter 1. Sustainable Energy Security For India—An Indicator-Based...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“...Invited Talks -- Automating Security Configuration and Administration: An Access Control...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment...”View full text
Electronic
eBook
17
Published 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”View full text
Electronic
eBook
18
19
Table of Contents:
“...Part I: Multimedia Systems -- Introduction -- Advances in Multimedia Encryption -- Securing...”
View full text
View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Typology for Modeling Processes in Clinical Guidelines and Protocols -- How Process Helps You in Developing...”View full text
Electronic
eBook



