Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
developing computers » developing computer, developing competent, developing competence
processing security » processing series
https developing » hits developing, steps developing, crops developing
computers https » computing https, computers gtt, computers help
developing computers » developing computer, developing competent, developing competence
processing security » processing series
https developing » hits developing, steps developing, crops developing
computers https » computing https, computers gtt, computers help
1
Pubblicazione 2005
Sommario:
“... points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation...”Testo
Elettronico
eBook
2
Pubblicazione 2014
Sommario:
“...Wireless sensor networks -- Cloud computing -- Wireless communication -- Antenna design -- Signal...”Testo
Elettronico
eBook
3
Pubblicazione 2010
Sommario:
“... without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development...”Testo
Elettronico
eBook
4
Pubblicazione 2013
Sommario:
“...Chapter I - Information Systems Development -- Rule Based Approach for Ensuring Consistency...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... -- Security Requirements Specification in Process-aware Information Systems -- Privacy, Data Protection...”Testo
Elettronico
eBook
6
Pubblicazione 2013
Sommario:
“...Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy...”Testo
Elettronico
eBook
7
8
Pubblicazione 2012
Sommario:
“...Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy...”Testo
Elettronico
eBook
9
Sommario:
“...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...”
Testo
Testo
Elettronico
eBook
10
Pubblicazione 2010
Sommario:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”Testo
Elettronico
eBook
11
Pubblicazione 2007
Sommario:
“...Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform...”Testo
Elettronico
eBook
12
Pubblicazione 2006
Sommario:
“... to Capture Secure Document Processing Requirements -- PKi Consolidation Project and Multiapplicative Smart...”Testo
Elettronico
eBook
13
Pubblicazione 2015
Sommario:
“...Part I: Energy Security -- Chapter 1. Sustainable Energy Security For India—An Indicator-Based...”Testo
Elettronico
eBook
14
Pubblicazione 2010
Sommario:
“...Invited Talks -- Automating Security Configuration and Administration: An Access Control...”Testo
Elettronico
eBook
15
Pubblicazione 2015
Sommario:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”Testo
Elettronico
eBook
16
Pubblicazione 2006
Sommario:
“... Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment...”Testo
Elettronico
eBook
17
Pubblicazione 2007
Sommario:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”Testo
Elettronico
eBook
18
19
Sommario:
“...Part I: Multimedia Systems -- Introduction -- Advances in Multimedia Encryption -- Securing...”
Testo
Testo
Elettronico
eBook
20
Pubblicazione 2010
Sommario:
“... Typology for Modeling Processes in Clinical Guidelines and Protocols -- How Process Helps You in Developing...”Testo
Elettronico
eBook



