Treffer 241 - 260 von 34.625

241

Administration of Security
Coffin, David ; Coffin, David
Expert Oracle and Java Security : Programming Secure Oracle Database Applications with Java. :329-402

E-Book
243

Management of Food Security Culturization in Nature Elementary Schools: Policy, Learning, and Student Engagement
Deni Hadiana ; Novi Sylvia ; Ibnu Salman ; et al.
15

Food Hunger Elementary Schools Learner Engagement Educational Policy Physical Environment
Fachzeitschrift
244

Dieses Ergebnis kann Gästen nicht angezeigt werden.

245

Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies
Elrakaiby, Yehia ; Amrani, Moussa ; Le Traon, Yves ; et al.
Lecture Notes in Computer Science ISBN: 9783319048963

Computer science [C05] [... Security policy Access Control Fine-grained security po... Policy enforcement point... Java programming languag...
Buch
246

An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies
Scheffler, Thomas ; Geiß, Stefan ; Schnor, Bettina
IFIP – The International Federation for Information Processing ; Proceedings of The Ifip Tc 11 23rd International Information Security Conference ; page 157-171 ; ISSN 1571-5736 ; ISBN 9780387096988 9780387096995

Buch
247

Common Criteria Investigation
Debbabi, Mourad ; Saleh, Mohamed ; Talhi, Chamseddine ; et al.
Embedded Java Security : Security for Mobile Devices. :167-202

E-Book
248

[A Java class library for accessing Cadplan data].
Zagler N
Publisher: Elsevier GmbH Country of Publication: Germany NLM ID: 100886455 Publication Model: Print Cited Medium: Print ISSN: 0939-3889 (Print) Linking ISSN: 09393889 NLM ISO Abbreviation: Z Med Phys Subsets: MEDLINE

Computer Graphics Computer Security Humans Information Storage and... Male Patient Care Planning tr...
Fachzeitschrift
250

Accessing secure information using export file fraudulence
Bouffard, Guillaume ; Khefif, Tom ; Lanet, Jean-Louis ; et al.
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) Risks and Security of Internet and Systems (CRiSIS), 2013 International Conference on. :1-5 Oct, 2013

Konferenz
251

Performance of the Java security manager
Herzog, Almut ; Shahmehri, Nahid
Computers & Security. May2005, Vol. 24 Issue 3, p192-207. 16p.

Security systems Computer security Computer science Java programming languag...
Fachzeitschrift
252

Introduction
Coffin, David ; Coffin, David
Expert Oracle and Java Security : Programming Secure Oracle Database Applications with Java. :1-3

E-Book
253

IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
Li, Ziyang ; Dutta, Saikat ; Naik, Mayur

Computer Science - Crypt... Computer Science - Progr... Computer Science - Softw...
Report
254

Java security architecture revisited.
Gong, Li
Communications of the ACM. Nov2011, Vol. 54 Issue 11, p48-52. 5p.

Computer security Computer architecture Sandboxes (Computer scie... Computer programming Computer software Programming languages
Zeitschrift
256

A Look at Java Security.
Ben Rothke
Information Security Management Handbook, 6th ed.. :2381-2386

Referenz
257

Mobile Forensics – The File Format Handbook
Hummert, Christian ; Pawlaszczyk, Dirk

Mobile File Systems Mobile File Formats Data Security APFS Ext4 F2FS
E-Book
258

DevOps-Gym: Benchmarking AI Agents in Software DevOps Cycle
Tang, Yuheng ; Zhu, Kaijie ; Ruan, Bonan ; et al.

Software Engineering Artificial Intelligence Cryptography and Securit...
Report
259

Server -based Java security products help guard your enterprise flank
Helen Meyer
Computers & Security. 18:153-154

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
260

Risk Analysis
Debbabi, Mourad ; Saleh, Mohamed ; Talhi, Chamseddine ; et al.
Embedded Java Security : Security for Mobile Devices. :153-165

E-Book

Filter