by
Rittinghouse, John W.
Format:
Electronic Resources
Excerpt:
books that cover components of the architecture, design, theory, issues, challenges, and recommended
by
Burnett, Mark M.
Format:
Electronic Resources
Excerpt:
architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously
View Other Search Results
by
Subramanian, Ramesh.
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8
Format:
Electronic Resources
Excerpt:
institutional theory perspective / Sushma Mishra, Amita Goyal Chin ; The Impact of the UK Human Rights Act 1998
by
Burnett, Mark.
Format:
Electronic Resources
Excerpt:
architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously
by
Oppliger, Rolf.
Format:
Electronic Resources
Excerpt:
Introduction -- 1.1 OSI SECURITY ARCHITECTURE -- 1.1.1 Security Services -- 1.1.2 Security Mechanisms -- 1.2
by
Dwivedi, Himanshu.
Format:
Electronic Resources
Excerpt:
network architecture environments. Additionally, find out about the similarities and differences of the
by
Fernandez-Buglioni, Eduardo.
Format:
Electronic Resources
Excerpt:
issue to consider during the design and implementation of any distributed software architecture
by
Norman, Thomas L.
Format:
Electronic Resources
Excerpt:
ARCHITECTURE -- INTERFACING TO OTHER ENTERPRISE INFORMATION TECHNOLOGY SYSTEMS -- SUMMARY -- CHAPTER NOTES
Limit Search Results
Narrowed by: