Search ResultsElektronik Kaynaklar
by
Tiller, James S.
Format:
Alıntı:
Adaptive security management architecture Tiller, James S.
by
Boulanger, Jean-Louis.
Format:
Alıntı:
Computer architecture.
by
Lang, Ulrich.
Format:
Alıntı:
CORBA (Computer architecture)
by
Piccard, Paul L.
Format:
Alıntı:
Peer-to-peer architecture (Computer networks)
by
Piccard, Paul L.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490177
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
Format:
Alıntı:
Peer-to-peer architecture (Computer networks)
by
Winkler, J. R. (Joachim R.)
Format:
Alıntı:
, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security
by
Mandal, Jyotsna Kumar. editor.
Format:
Alıntı:
Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.
by
Maynor, David.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490740
Format:
Alıntı:
Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture
by
Winkler, J. R. (Joachim R.)
ScienceDirect http://www.sciencedirect.com/science/book/9781597495929
Format:
Alıntı:
, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security
by
Kinney, Steven.
ScienceDirect http://www.sciencedirect.com/science/book/9780750679602
Format:
Alıntı:
TCG prerequisites -- Cryptographic basics -- Overview of the TPM architecture -- Root-of-trust, the
by
Rittinghouse, John W.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583385
Format:
Alıntı:
components of the architecture, design, theory, issues, challenges, and recommended policies for IM security
by
Mishra, Prabhat. editor.
Format:
Alıntı:
, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple





