Ähnliche Einträge: Formal models and techniques for analyzing security protocols
Thema: Computer security.
- Multilevel security and DB2 row-level security revealed
- A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
- How to cheat at designing security for a Windows Server 2003 network
- Reversing secrets of reverse engineering /
- Innocent code a security wake-up call for Web programmers /
- zSeries Trusted Key Entry (TKE) version 4.2 update
Verfasser: ebrary, Inc
- Multilevel security and DB2 row-level security revealed
- Fractional statistics and quantum theory
- Applications of multi-objective evolutionary algorithms
- Explanatory nonmonotonic reasoning
- The numerical solution of systems of polynomials arising in engineering and science
- Lithium-ion batteries solid-electrolyte interphase /