Suggested Topics within your search.
Suggested Topics within your search.
-
1por Asokan, N., Davi, Lucas, Dmitrienko, Alexandra, Heuser, Stephan, Kostiainen, Kari, Reshetova, Elena, Sadeghi, Ahmad-RezaTable of Contents: “... security model -- 2.3.1 Software deployment -- 2.3.2 Application installation -- 2.3.3 Runtime protection...”
Publicado 2014
Abstract with links to full text
eBook -
2por Asokan, N., Davi, Lucas, Dmitrienko, Alexandra, Heuser, Stephan, Kostiainen, Kari, Reshetova, Elena, Sadeghi, Ahmad-RezaTable of Contents: “... security model -- 2.3.1 Software deployment -- 2.3.2 Application installation -- 2.3.3 Runtime protection...”
Publicado 2014
Abstract with links to full text
eBook -
3Table of Contents: “... pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation...”
Abstract with links to full text
eBook -
4Table of Contents: “... pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation...”
Abstract with links to full text
eBook