„Spring Security“
Suchergebnisse
6.001 Treffer
-
Analysis and Design of Next-Generation Software Architectures – Generative AI, Cybersecurity, and Cloud Computing
-
Rüstung und Rüstungskontrolle in Asien – Zum Stabilisierungspotenzial einer sicherheitspolitischen Strategie
-
The Preference-Driven Lead User Method for New Product Development – A Comprehensive Way to Stimulate Innovations with Internal and External Sources
-
Advances in Digital Forensics IX – 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
-
Advances in Cryptology - ASIACRYPT 2010 – 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
-
Künstliche Intelligenz und politischer Extremismus – Ein Überblick
-
Beier, C., Messner, D., & Preuß, H.-J. (Hrsg.) (2020). Globale Wanderungsbewegungen. Beiträge der internationalen Zusammenarbeit zum Umgang mit Flucht und Migration – Wiesbaden: Springer VS. 346 S., ISBN: 978-3-658-28236-3, € 49,99.
-
Bures, Oldrich, & Carrapico, Helena (eds.): Security privatization: how non-security-related private businesses shape security governance – Springer, Amsterdam, 2018, ISBN 978-3-319-63009-0, 135.19 €, 299 pp
-
Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie?
-
Security and Trust Management – 21st International Workshop, STM 2025, Toulouse, France, September 25–26, 2025, Proceedings
-
The Political Economy of Robots – Prospects for Prosperity and Peace in the Automated 21st Century, 2nd edition
-
Climate-Smart Agricultural Technologies – Approaches for Field Crops Production Systems
-
Security and Privacy in Communication Networks – 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part III
-
Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings
-
Codebasierte Post-Quanten-Kryptografie – Goppa Codes und das McEliece Kryptosystem
-
S.B. Sharma and J.A. Wightman. 2015. Vision infinity for food security – some whys, why nots and hows! – Springer Briefs in Agriculture, Dordrecht, The Netherlands, 2015 xvii + 98 pp. Paperback ISBN 978-3-319-23248-5
-
Deep Learning in Textual Low-Data Regimes for Cybersecurity
-
Data Privacy Management and Autonomous Spontaneous Security – 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers
-
Reflexive Sicherheit, Freiheit und Grenzmanagement in der Europäischen Union – Die Reterritorialisierung emergenter Bedrohungsgefüge
-
Verifiable Privacy Protection for Vehicular Communication Systems