1
by Hunter, Beau., Hunter, Beau.
Published 2005
Table of Contents: ... -- Deploying Group Policy -- Active Directory Security -- Managing Large-Scale Deployments -- Active Directory...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ... Security Regulation in the United States: An Overview of U.S. NRC Functions and Activities -- Current...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ...: Application to the Electron Doped Manganites -- Towards Electrochromic Devices Active in the IR Region...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... -- Testing Functional Requirements in UML Activity Diagrams -- Coverage of OCL Operation Specifications...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ... Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques for ESB...
View full text
Electronic eBook
14
by Berube, David., Berube, David.
Published 2007
Table of Contents: ... -- Managing Installed Gem Versions -- Using Particular Gems -- Data Access with the ActiveRecord Gem -- Easy...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Architecture for Dynamic Function Patterns -- Reconfigurable Components for Application-Specific Processor...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... the Formation of Trust -- User Model -- Enabling Active User Participation in Self-Adaptive Applications...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... Systems -- Verifying Concurrent Programs by Memory Unwinding -- AutoProof: Auto-Active Functional...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
20
Table of Contents: ... from .NET Applications -- Deploying Reports -- Managing Reports -- Securing Reports -- Delivering...
View full text
Electronic eBook