Search alternatives:
processing securities » processing security, processing series, processing facilities
developing computing » developing competent, developing computer, developing coping
securities https » security https
https developing » hits developing, steps developing, crops developing
1
Table of Contents: ...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ...Wireless sensor networks -- Cloud computing -- Wireless communication -- Antenna design -- Signal...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development...
View full text
Electronic eBook
5
Published 2013
Table of Contents: ...Chapter I - Information Systems Development -- Rule Based Approach for Ensuring Consistency...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... -- Security Requirements Specification in Process-aware Information Systems -- Privacy, Data Protection...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ...Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy...
View full text
Electronic eBook
8
Published 2011
Subjects: ...Computer security....
View full text
Electronic eBook
9
Published 2012
Table of Contents: ...Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... to Capture Secure Document Processing Requirements -- PKi Consolidation Project and Multiapplicative Smart...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ...Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ...Part I: Energy Security -- Chapter 1. Sustainable Energy Security For India—An Indicator-Based...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ...Invited Talks -- Automating Security Configuration and Administration: An Access Control...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment...
View full text
Electronic eBook
17
Published 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
View full text
Electronic eBook
18
Published 2014
Subjects: ...Computer security....
View full text
Electronic eBook
19
Table of Contents: ...Part I: Multimedia Systems -- Introduction -- Advances in Multimedia Encryption -- Securing...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Typology for Modeling Processes in Clinical Guidelines and Protocols -- How Process Helps You in Developing...
View full text
Electronic eBook