Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs active » programs action, programs adaptive, programs practices
securing https » security https, security http, securing rtp
active https » practice https, vaccine https, crime https
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs active » programs action, programs adaptive, programs practices
securing https » security https, security http, securing rtp
active https » practice https, vaccine https, crime https
1
Table of Contents:
“... -- Deploying Group Policy -- Active Directory Security -- Managing Large-Scale Deployments -- Active Directory...”
View full text
View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“... Security Regulation in the United States: An Overview of U.S. NRC Functions and Activities -- Current...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
9
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“...: Application to the Electron Doped Manganites -- Towards Electrochromic Devices Active in the IR Region...”View full text
Electronic
eBook
12
Published 2015
Table of Contents:
“... -- Testing Functional Requirements in UML Activity Diagrams -- Coverage of OCL Operation Specifications...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“... Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques for ESB...”View full text
Electronic
eBook
14
Table of Contents:
“... -- Managing Installed Gem Versions -- Using Particular Gems -- Data Access with the ActiveRecord Gem -- Easy...”
View full text
View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Architecture for Dynamic Function Patterns -- Reconfigurable Components for Application-Specific Processor...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... the Formation of Trust -- User Model -- Enabling Active User Participation in Self-Adaptive Applications...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... Systems -- Verifying Concurrent Programs by Memory Unwinding -- AutoProof: Auto-Active Functional...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... -- Programming with Actors in Java 8 -- Contracts in CML -- Distributed Energy Management Case Study: A Formal...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...”View full text
Electronic
eBook
20
Table of Contents:
“... from .NET Applications -- Deploying Reports -- Managing Reports -- Securing Reports -- Delivering...”
View full text
View full text
Electronic
eBook



