1
2
by Cheruvu, Sunil.
Published 2019
Format:
Table of Contents: ... Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security...
Click to View
3
4
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web...
Click to View
5
by Lysne, Olav.
Published 2018
Format:
Table of Contents: ... in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers...
Click to View
6
by Domingue, John.
Published 2011
Format:
Table of Contents: ... -- Research Focus on Developing Secure FI Services -- Security Requirements Engineering -- Secure Service...
Click to View
7
by Reussner, Ralf.
Published 2019
Format:
Table of Contents: ... Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security...
Click to View
8
by Youssef, Ali.
Published 2014
Format:
Table of Contents: ... -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization...
Click to View
9
by Galis, Alex.
Published 2013
Format:
Table of Contents: ....4 Logistics Applications -- 3.5 Security-Related Applications -- 4 Conclusions -- References -- High...
Click to View
10
by Köhn, Doris.
Published 2014
Format:
Table of Contents: ... for Donors -- References -- Publications on Value Chain Financing -- CHAPTER 2 Food Security and a Holistic...
Click to View