1
by Powers, David., Powers, David.
Published 2014
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
2
by Powers, David., Powers, David.
Published 2010
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
3
by Powers, David., Powers, David.
Published 2007
Table of Contents: ... -- Managing Content -- Solutions to Common PHP/Mysql Problems -- Keeping Intruders at Bay....
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack...
View full text
Electronic eBook
7
by Ruan, Xiaoyu., Ruan, Xiaoyu.
Published 2014
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ...: Mapping Solver Independent Models to Efficient Solutions -- Use of Logic Programming for Complex Business...
View full text
Electronic eBook
10
by Sack, Joseph., Sack, Joseph.
Published 2006
Table of Contents: ... -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional Processing, Control-of-Flow...
View full text
Electronic eBook
11
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...
View full text
Electronic eBook
13
by Sack, Joseph., Sack, Joseph.
Published 2008
Table of Contents: ..., and Deadlocking -- Tables -- Indexes -- Full-Text Search -- Views -- SQL Server Functions -- Conditional...
View full text
Electronic eBook
14
Published 2015
Table of Contents: ... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ...Invited Talks -- Sporadic Solutions to Zero-One Exclusion Tasks -- Verifying and Synthesizing...
View full text
Electronic eBook
16
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... Functions in Gene Expression Programming -- Evolving Intrusion Detection Systems -- Evolutionary Pattern...
View full text
Electronic eBook
18
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...
View full text
Electronic eBook
19
Table of Contents: ... -- Multimedia -- Database Access -- Networking and Remoting -- Security and Cryptography -- Unmanaged Code...
View full text
Electronic eBook
20
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...
View full text
Electronic eBook