Last searches
Results for *
Displaying results 51 to 75 of 130.
-
Zero day exploit
countdown to darkness -
Information warfare in business
strategies of control and resistance in the network society -
Hacking exposed J2EE & JAVA
developing secure applications with JAVA technology -
Open-Source-Software und IT-Sicherheit
Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg -
Encyclopedia of information ethics and security
-
Core security patterns
best practices and strategies for J2EE , web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
Information Retrieval and Natural Language Processing
A Graph Theory Approach -
Digitale Kompetenz
Grundlagen der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen für die Digitale Transformation -
Digitale Kompetenz
Grundlagen der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation -
Open-Source-Software und IT-Sicherheit
Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg -
Stealing the network
how to own the box -
Guidelines for the security of information systems
-
Network security
vulnerabilities and disclosure policy -
J2EE security for servlets, EJBs and web services
applying theory and standards to practice -
Norway
information security -
Core security patterns
best practices and strategies for J2EE applications, web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
Stealing the network
how to own the box -
Stealing the network
how to own a continent -
Visualization of time-oriented data
-
Stealing the network
how to own a continent -
Stealing the network
how to own the box -
Zero day exploit
countdown to darkness -
Hacking in the humanities
cybersecurity, speculative fiction, and navigating a digital future -
Hacking in the Humanities
Cybersecurity, Speculative Fiction, and Navigating a Digital Future -
Cybersicherheit und Cyber-Resilienz in den Finanzmärkten