نتایج جستجو
Certification and Security in Health-Related Web Applications: Concepts and Solutions
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis, 2010
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
R. Sekar (auth.), Yingjiu Li (eds.), 2011
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
Vijay Atluri, Günther Pernul (eds.), 2014
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's guide to web application security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.), 2014
Java Security Solutions
Rich Helton, Johennie Helton, 2002
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
Building Global Security Through Cooperation: Annals of Pugwash 1989
Richard Garwin (auth.), Professor Dr. Joseph Rotblat, Professor John P. Holdren (eds.), 1990
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang, 2010
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang (auth.), 2010
Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)
Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
Wen-Chung Kuo (auth.), Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.), 2009
Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.), 2015
Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991
Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
