Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "The Tempest"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Showing
1
-
7
of
7
Search:
'"The Tempest"'
,
query time: 0.05s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
E-Voting and Identity : Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... -- Combatting Electoral Traces: The Dutch
Tempest
Discussion and Beyond...
”
Read Now
2
Information Hiding : Second International Workshop, IH’98, Portland, Oregon, USA, April 14–17, 1998, Proceedings
Published 1998
Springer Berlin Heidelberg
Table of Contents:
“
... Protecting Person Authentication -- On Software Protection via Function Hiding -- Soft
Tempest
: Hidden Data...
”
Read Now
3
Automated Technology for Verification and Analysis : 19th International Symposium, ATVA 2021, Gold Coast, QLD, Australia, October 18–22, 2021, Proceedings
Published 2021
Springer International Publishing
Table of Contents:
“
... causes in Markov Chains --
TEMPEST
- Synthesis Tool for Reactive Systems and Shields in Probabilistic...
”
Read Now
4
Computer security basics
by
Lehtinen, Rick
Published 2006
O'Reilly
“
... Computer security and requirements of the Orange Book OSI Model and
TEMPEST
....
”
Call Number:
QA76.9.A25
Read Now
5
Information Systems Security : Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings
Published 2007
Springer Berlin Heidelberg
Table of Contents:
“
...Information Leakage Via Electromagnetic Emanations and Evaluation of
Tempest
Countermeasures...
”
Read Now
6
Information Security Applications : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the
Tempest
Fonts...
”
Read Now
7
Entertainment Computing - ICEC 2006 : 5th International Conference, Cambridge, UK, September 20-22, 2006, Proceedings
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
... Interaction in Online Games --
TEMPEST
: A Text Input System for Musical Performers -- Design Strategies...
”
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
004 - Data processing & computer science
1
331 - Labor economics
1
Language
English
7
Collection
Springer eBooks 2005-
5
O'Reilly
1
Springer Book Archives -2004
1
Author
Aucsmith, David
1
Combetto, Marco
1
Ganesh, Vijay
1
Gangemi, G. T.
1
Gupta, Shyam K.
1
Hou, Zhe
1
more ...
Lehtinen, Rick
1
Lim, Chae Hoon
1
McDaniel, Patrick
1
Rauterberg, Matthias
1
Russell, Deborah
1
Ryan, Peter Y. A.
1
Schoenmakers, Berry
1
Yung, Moti
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%22The+Tempest%22&type=AllFields
Send by Email
×
Loading...