1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...
View full text
Electronic eBook
3
Table of Contents: ... -- Multimedia -- Database Access -- Networking and Remoting -- Security and Cryptography -- Unmanaged Code...
View full text
Electronic eBook
4
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
11
by Powers, David., Powers, David.
Published 2014
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
12
by Powers, David., Powers, David.
Published 2010
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
13
by Powers, David., Powers, David.
Published 2007
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ... of Climate Impacts: The Example of Agile Workflows for the ci:grasp Platform -- A Visual Programming Approach...
View full text
Electronic eBook
15
Table of Contents: ...Core Concepts -- Introducing ASP.NET -- Visual Studio -- Web Forms -- Server Controls -- ASP.NET...
View full text
Electronic eBook
16
Table of Contents: ...Core Concepts -- Introducing ASP.NET -- Visual Studio -- Web Forms -- Server Controls -- ASP.NET...
View full text
Electronic eBook
17
Table of Contents: ...Core Concepts -- Introducing ASP.NET -- Visual Studio 2005 -- Web Forms -- Server Controls...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor...
View full text
Electronic eBook
20
by Kofler, Michael., Kofler, Michael.
Published 2005
Table of Contents: ... Design -- An Introduction to SQL -- SQL Recipes -- Access Administration and Security -- GIS Functions...
View full text
Electronic eBook