Search alternatives:
developing complexity » development complexity, developing complex, exploring complexity
processing security » processing series
https developing » hits developing, steps developing, crops developing
1
Published 2007
Table of Contents: ... Distribution Process in South Africa -- Hard-drive Disposal and Identity Fraud -- An analysis of security...
View full text
Electronic eBook
2
Published 2012
Subjects: ...Complexity. https://scigraph.springernature.com/ontologies/product-market-codes/T11022...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... Engineers -- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ...Visionary Papers -- A Formal Broker Framework for Secure and Cost-Effective Business Process...
View full text
Electronic eBook
6
Published 2011
Table of Contents: ... -- Automation Tools Supporting the Development of Information Standards for Complex Systems -- Use of Structured...
View full text
Electronic eBook
7
Subjects: ...Algorithm Analysis and Problem Complexity. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... -- Aspect-Oriented Risk Driven Development of Secure Applications -- From Business Process Choreography...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... AéroportésFIT -- Requirement management for complex systems, a critical element of the integration process...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... and Correlated Development of Vision, Strategies and Projects in Complex Environments.-20 Chaotic Interaction...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Kristian Beckman Award Awardee Keynote -- The 5 Waves of Information Security – From Kristian...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... Relates to Functions -- Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Computations -- Complexity Issues in Automated Model Revision without Explicit Legitimate State -- Algorithmic...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ...Mutation Testing Process Combined with Test-Driven Development in NET Environment -- Boltzmann...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Behaviours iin Agent-Based Simulation: Colonic Crypt Cell Populations -- Developing a Complex Approach...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... in Developing Countries Using Multimedia Technology -- Scheduling and Planning Software for Corrugation Process...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... and Algorithms -- Session 6C: Distributed Routing and Switching Protocols I -- Session 7A: Security I -- Session...
View full text
Electronic eBook