Search alternatives:
secure programming » scope programming, service programming, focused programming
application layer » application based, application level, application areas
developing secure » developing leisure, developing future, developing nature
layer developing » leader developing, labor developing, water developing
secure programming » scope programming, service programming, focused programming
application layer » application based, application level, application areas
developing secure » developing leisure, developing future, developing nature
layer developing » leader developing, labor developing, water developing
1
2
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “... Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security...”
Click to View
3
4
by Nayak, Umesha.
Published 2014
Format:
Published 2014
Table of Contents: “... Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web...”
Click to View
5
by Lysne, Olav.
Published 2018
Format:
Published 2018
Table of Contents: “... in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers...”
Click to View
6
by Domingue, John.
Published 2011
Format:
Published 2011
Table of Contents: “... -- Research Focus on Developing Secure FI Services -- Security Requirements Engineering -- Secure Service...”
Click to View
7
by Reussner, Ralf.
Published 2019
Format:
Published 2019
Table of Contents: “... Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security...”
Click to View
8
by Youssef, Ali.
Published 2014
Format:
Published 2014
Table of Contents: “... -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization...”
Click to View
9
by Galis, Alex.
Published 2013
Format:
Published 2013
Table of Contents: “....4 Logistics Applications -- 3.5 Security-Related Applications -- 4 Conclusions -- References -- High...”
Click to View
10
by Köhn, Doris.
Published 2014
Format:
Published 2014
Table of Contents: “... for Donors -- References -- Publications on Value Chain Financing -- CHAPTER 2 Food Security and a Holistic...”
Click to View


