Search alternatives:
application security » application scenarios, application service, application specific
developing trust » developing east, develop trust, developing cross
trust programs » rust programs, test programs, forest programs
application security » application scenarios, application service, application specific
developing trust » developing east, develop trust, developing cross
trust programs » rust programs, test programs, forest programs
1
by Sadowsky, George, Dempsey, James X., Greenberg, Alan, Mack, Barbara J., Schwartz, Alan
Published 2013
Subjects:
“...ADEQUATE SECURITY...”Published 2013
Get full text
Get full text
2
3
by Lemieux, Victoria L.
Published 2015
Subjects:
“...DEVELOPMENT PROGRAM...”Published 2015
Get full text
Get full text
4
5
6
by Hashim, Ali
Published 2015
Subjects:
“...INTERNATIONAL DEVELOPMENT...”Published 2015
Get full text
Get full text
7
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “... -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security...”
Click to View
8
by World Bank Group
Published 2014
Subjects:
“...APPLICATION PROCEDURES...”Published 2014
Get full text
Get full text
9
10
11
12
13
14
15
by Eskelinen, Jarmo, Garcia Robles, Ana, Lindy, Ilari, Marsh, Jesse, Muente-Kunigami, Arturo
Published 2015
Subjects:
“...mobile applications...”Published 2015
Get full text
16
by Lysne, Olav.
Published 2018
Format:
Published 2018
Table of Contents: “... of Choice -- 2.4 Trust, Consequence, and Situation -- 2.5 Trust and Security -- 2.6 Trusted Computing Base...”
Click to View
17
18
by World Bank
Published 2012
Subjects:
“...COMPREHENSIVE DEVELOPMENT...”Published 2012
Get full text
Get full text
19
20


