„Spring Security“
Suchergebnisse
6.001 Treffer
-
Emerging Technologies in Data Mining and Information Security – Proceedings of IEMIS 2022, Volume 2
-
Deep Learning for Computational Problems in Hardware Security – Modeling Attacks on Strong Physically Unclonable Function Circuits
-
Research and Practical Issues of Enterprise Information Systems – 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna, Austria, December 13–14, 2016, Proceedings
-
Migration, Risk Management and Climate Change: Evidence and Policy Responses
-
Poland's Security Policy – The West, Russia, and the Changing International Order
-
The Legal Regime Applicable to Private Military and Security Company Personnel in Armed Conflicts
-
National Security Issues of the USSR
-
The Transnational Land Rush in Africa – A Decade After the Spike
-
Professionelles Sicherheitsmanagement für Unternehmen – Leitfaden für erfolgreiche Corporate Security
-
Smart Grids from a Global Perspective – Bridging Old and New Energy Systems
-
Resources, Services and Risks – How Can Data Observatories Bridge The Science-Policy Divide in Environmental Governance?
-
Financial cryptography and data security – revised selected papers
-
Intelligent monitoring, control, and security of critical infrastructure systems
-
The risks of nuclear energy technology – safety concepts of light water reactors
-
Big Data Privacy and Security in Smart Cities
-
Security Issues in Fog Computing from 5G to 6G – Architectures, Applications and Solutions
-
Financial cryptography and data security – revised selected papers
-
Modern cryptography primer – theoretical foundations and practical applications
-
Quality, reliability, security and robustness in heterogeneous networks – 9th international conference ; revised selected papers
-
Information Flow Based Security Control Beyond RBAC – How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)