„Spring Security“
Suchergebnisse
6.001 Treffer
-
Water Governance in the Face of Global Change – From Understanding to Transformation
-
Self-Help, Private Debt Collection and the Concomitant Risks – A Comparative Law Analysis
-
Locating, Classifying and Countering Agile Land Vehicles – With Applications to Command Architectures
-
Human Aspects of Information Security, Privacy, and Trust – Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings
-
The Strategic Use of International Law by the United Nations Security Council – An Empirical Study
-
Intelligent Mechanisms for Network Configuration and Security – 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings
-
Advanced Information Systems Engineering Workshops – CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings
-
Future Network Systems and Security – First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings
-
Cities and Sustainability – Issues and Strategic Pathways
-
ICT Systems Security and Privacy Protection – 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
-
Intelligence and Security Informatics – Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings
-
Optical Soliton Communication Using Ultra-Short Pulses
-
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
-
Bruce M. Russett: Pioneer in the Scientific and Normative Study of War, Peace, and Policy
-
Leakage Resilient Password Systems
-
Supply Chain Design and Management for Emerging Markets – Learning from Countries and Regions
-
Theory and Applications of Models of Computation – 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings
-
Pattern and Security Requirements – Engineering-Based Establishment of Security Standards
-
The Water We Eat – Combining Virtual Water and Water Footprints
-
Cyber Warfare – Building the Scientific Foundation