Search alternatives:
"regularity" » "regularly"

1
by Forta, Ben
Published 2018
Addison-Wesley
Subjects: ...Regular expressions (Computer science) / http://id.loc.gov/authorities/subjects/sh2018002310...

2
by Braddon, Laurence
Published 1721
printed for, and sold by Tho. Warner, in Pater-Noster-Row, and Joseph Fox, in Westminster-Hall

3
by Braddon, Laurence
Published 1721
Printed for and sold by Tho. Warner ... and Joseph Fox
...Regular government and judicious employment of the poor, the most probable means of raising...

4
Published 2018
The World Bank
...The European Union (EU) Regular Economic Report (RER), is an annual publication of the World Bank...

5
by Muharremi, Robert, Ramadani, Alisa
Published 2024
Palgrave Macmillan
Table of Contents: ..., and the Kosovo Protection Corps -- 4. Kosovo’s Independence and the Kosovo Security Force -- 5. From Kosovo...

6
Published 2018
The World Bank
... for more secure long-term growth. External imbalances have been high but mostly stable. The risks clouding...

7
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

8
Published 2020
Springer International Publishing
Table of Contents: ...DETIPS 2020: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital...

9
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber...

10
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

11
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

12
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues...

13
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

14
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

15
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...

16
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Address -- A: The Environment and Security Nexus -- Environment and Security in International Politics...

17
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against...

18
Published 2021
Springer International Publishing
Table of Contents: ... Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled...

19
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...CSS 2012 Regular Papers -- Session 1: Mobile Security -- Identity and Its Authentication Protocol...

20
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...