Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
"supply data integration services." » "supply data integrating services.", "supply data integrated services.", "supply data insemination services.", "supply data integrity services."
"supply layer security services." » "supply layer electricity services.", "supply water security services.", "supply cyber security services.", "supply case security services.", "supply based security services.", "supply latin security services."
"supply data integration services." » "supply data integrating services.", "supply data integrated services.", "supply data insemination services.", "supply data integrity services."
"supply layer security services." » "supply layer electricity services.", "supply water security services.", "supply cyber security services.", "supply case security services.", "supply based security services.", "supply latin security services."
1
2
by Yeluri, Raghuram.
Published 2014
Format:
Published 2014
Table of Contents: “... Evolution: From Stovepipes to Service Networks -- The Cloud as the New Way of Doing IT -- Security as a...”
Click to View
3
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “...-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security...”
Click to View
4
by Karner, Michael.
Published 2024
Format:
Published 2024
Table of Contents: “... -- 6 Building Technology for Intelligent, Secure, Trustworthy Things -- 7 Reference Architecture...”
Click to View
5
by Nayak, Umesha.
Published 2014
Format:
Published 2014
Table of Contents: “... Security Specialists -- Project Managers -- Data Owners -- Data Custodians -- Users of the data...”
Click to View
6
by Futral, William.
Published 2013
Format:
Published 2013
Table of Contents: “... -- Reporting and Logging -- Enablement at the Security Applications Layer -- Chapter 7: Creating a More Secure...”
Click to View
7
by Bhushan, Bharat.
Published 2023
Format:
Published 2023
Table of Contents: “... Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7...”
Click to View
8
by Domingue, John.
Published 2011
Format:
Published 2011
Table of Contents: “... Services -- Introduction -- Future Internet Services -- The Need for Engineering Secure Software Services...”
Click to View
9
by Galis, Alex.
Published 2013
Format:
Published 2013
Table of Contents: “... and Context -- 2 Future Network Standardization in ITU-T -- 2.1 Service Awareness -- 2.2 Data Awareness -- 2...”
Click to View
10
by Alvarez, Federico.
Published 2012
Format:
Published 2012
Table of Contents: “... Concerns and Challenges -- Privacy and Data Protection -- Online Identity -- Security of Communications...”
Click to View
11
by Bassi, Alessandro.
Published 2013
Format:
Published 2013
Table of Contents: “....9.4.4 Provide High System Integrity -- 6.9.4.5 Avoid Leap of Faith -- 6.9.5 Design Choices Addressing Security...”
Click to View
12
by Li, Hui.
Published 2021
Format:
Published 2021
Table of Contents: “... Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1...”
Click to View
13
by April, Kurt.
Published 2021
Format:
Published 2021
Table of Contents: “... infrastructure, service provision deficits -- High levels of informality -- The emerging African middle class...”
Click to View