„Spring Security“
Suchergebnisse
6.001 Treffer
-
Sicherheit von Webanwendungen in der Praxis – wie sich Unternehmen schützen können ; Hintergründe, Maßnahmen, Prüfverfahren und Prozesse
-
Formal aspects in security and trust – fourth international workshop ; revised selected papers
-
Transactions on data hiding and multimedia security
-
Computer safety, reliability, and security – 26th international conference ; proceedings
-
Computer security – proceedings
-
Trust, privacy and security in digital business – 4th international conference ; proceedings
-
Transactions on data hiding and multimedia security
-
Computational intelligence and security – international conference ; revised selected papers
-
Fighting al Qaeda in the Arabian Peninsula on All Fronts – A U.S. Counterterrorism Strategy in Yemen
-
Computer Science and its Applications – Ubiquitous Information Technologies
-
Asia's new institutional architecture – evolving structures for managing trade, financial, and security relations
-
Information security and privacy – 12th Australasian conference ; proceedings
-
Security and privacy in ad hoc and sensor networks – 4th European workshop ; proceedings
-
Radio Frequency Identification: Security and Privacy Issues – 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
-
Derivative security pricing – techniques, methods and applications
-
Trustworthy global computing – 9th international symposium ; revised selected papers
-
Security protocols XVIII – 18th international workshop, Cambridge, UK, April 24 - 26, 2010 ; revised selected papers
-
Inter domain management – proceedings
-
Advances in Cryptology – ASIACRYPT 2014 – 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
-
Applied cryptography and network security – 5th international conference ; proceedings