Sugestões de Tópicos dentro de sua busca.
Sugestões de Tópicos dentro de sua busca.
-
1por Asokan, N., Davi, Lucas, Dmitrienko, Alexandra, Heuser, Stephan, Kostiainen, Kari, Reshetova, Elena, Sadeghi, Ahmad-RezaSumário: “... security model -- 2.3.1 Software deployment -- 2.3.2 Application installation -- 2.3.3 Runtime protection...”
Publicado em 2014
Abstract with links to full text
livro eletrônico -
2por Asokan, N., Davi, Lucas, Dmitrienko, Alexandra, Heuser, Stephan, Kostiainen, Kari, Reshetova, Elena, Sadeghi, Ahmad-RezaSumário: “... security model -- 2.3.1 Software deployment -- 2.3.2 Application installation -- 2.3.3 Runtime protection...”
Publicado em 2014
Abstract with links to full text
livro eletrônico -
3Sumário: “... pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation...”
Abstract with links to full text
livro eletrônico -
4Sumário: “... pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation...”
Abstract with links to full text
livro eletrônico