by
Gadepalli, Venkata, author.
Format:
Electronic Resources
Excerpt:
Data protection.
by
Wiesner, Thomas, author.
Format:
Electronic Resources
Excerpt:
Data protection.
View Other Search Results
by
Carrasco Molina, Manuel, author.
Format:
Electronic Resources
Excerpt:
Data protection.
by
Austwick, Tim.
Format:
Electronic Resources
Excerpt:
: Updating Item Protection -- Appendix C: Untrusted Data Processing -- Expected Value -- Safe Quote -- Colon
by
Nuijten, A.
Format:
Electronic Resources
Excerpt:
-- Authorization -- Database schema -- URL tampering -- Session state protection against URL tampering -- Browser
by
Napier, Rob.
Format:
Electronic Resources
Excerpt:
-- Securing Network Communications -- Employing File Protection -- Using Keychains -- Using Encryption
by
Granor Ph. D., Tamar E.
Format:
Electronic Resources
Excerpt:
-- What-if analysis using data tables -- Goal Seek -- Protection -- Protecting a cell -- Protecting a
by
Tender, Peter De.
Format:
Electronic Resources
Excerpt:
Manager - SCCM -- System Center Service Manager - SCSM -- System Center Data Protection Manager - SCDPM
by
Stone, Bradley V.
Format:
Electronic Resources
Excerpt:
Netscape for Clearer Error Messages -- Trimming Blanks from Character Data -- Including JavaScript Source
by
Alessi, Patrick.
Format:
Electronic Resources
Excerpt:
Core Data -- Core Data and iCloud -- Data Protection -- Using Core Data: A Simple Task Manager
by
Miller, Charlie.
Format:
Electronic Resources
Excerpt:
-- Chapter 3 Encryption -- Data Protection -- Data Protection API -- Attacking Data Protection -- Attacking
by
Chell, Dominic.
Format:
Electronic Resources
Excerpt:
-- Property Lists -- Binary Cookies -- SQLite Databases -- Understanding the Data Protection API
Limit Search Results
Narrowed by: