Yazar
Hui, Lucas C. K. editor.
Format:
Electronic Resources
Alıntı:
systems -- Applied cryptography -- Access control -- Privacy protection -- Network security.
Yazar
Cuppens-Boulahia, Nora. editor.
Format:
Electronic Resources
Alıntı:
-- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior
Yazar
Askoxylakis, Ioannis. editor.
Format:
Electronic Resources
Alıntı:
, network security, access control, authentication, and security in such emerging areas as cloud computing
Yazar
Askoxylakis, Ioannis. editor.
Format:
Electronic Resources
Alıntı:
, network security, access control, authentication, and security in such emerging areas as cloud computing
Yazar
Foresti, Sara. editor.
Format:
Electronic Resources
Alıntı:
systems -- Access control and data protection.
Yazar
Meyer, Bertrand. editor.
Format:
Electronic Resources
Alıntı:
cyber-physical systems -- a control-theoretic approach to self-adaptive systems and an application to cloud-based
Yazar
Bauer, Thomas. editor.
Format:
Electronic Resources
Alıntı:
Security -- Towards Attribute-based Access Control Policy Engineering Using Risk -- Risk-Based Testing -- A
Yazar
Poovendran, Radha. editor.
Format:
Electronic Resources
Alıntı:
security, and control systems.
Yazar
Monfort, Valérie. editor.
Format:
Electronic Resources
Alıntı:
Institute for Systems and Technologies of Information, Control and Communication (INSTICC). The purpose of
Yazar
Rumpe, Bernhard. author.
Format:
Electronic Resources
Alıntı:
methods for data intensive or control driven systems. After a general introduction to UML and the choices
Yazar
Crowder, James A. author.
Format:
Electronic Resources
Alıntı:
employees' sense of identity. The text examines human psychological concepts such as “locus of control
Yazar
Tuosto, Emilio. editor.
Format:
Electronic Resources
Alıntı:
control-flow relations using Petri nets, consistency of cloud stores, model checking, model-drives design
Arama Sonuçlarını Sınırlandır
Daraltılmış: