Search alternatives:
"authorization" » "authoritative", "factorization"

161
by Weston, Charles
Published 1793
printed by L. Pennington. Sold in London by T. Cadell, in the Strand ; and Vernor and Hood, Birchin-Lane

162
by Tijms, Arjan, Bais, Teo, Keil, Werner
Published 2022
Apress
Subjects: ...Cloud computing / http://id.loc.gov/authorities/subjects/sh2008004883...

163
Published 2022
Springer Nature Singapore
Table of Contents: ...Chapter One: Neoliberal Globalization, Authoritarian Populism -- Chapter Two: Neoliberal Singapore...

165
by Feldstein, Steven
Published 2021
Oxford University Press
Subjects: ...Authoritarianism / Technological innovations...

166
by Tapscott, Rebecca
Published 2021
Oxford University Press
Subjects: ...Authoritarianism / Uganda...

167
Published 2016
Graduate Institute Publications
Subjects: ...authoritarianism...

168
Published 2018
Springer International Publishing
Table of Contents: ...Authentication and authorization techniques -- Authentication and authorization for interoperable...

169
Published 2020
Springer International Publishing
... for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers...

170
by Cupples, Julie, Glynn, Kevin
Published 2018
Springer International Publishing
Table of Contents: ... and authoritarianism in Nicaragua -- 2.Decolonial social movements, leftist governments and the media -- 3...

171
by Sun, Taiyi
Published 2023
University of Michigan Press
...Disruptions as Opportunities: Governing Chinese Society with Interactive Authoritarianism addresses...

172
by Repnikova, Maria
Published 2017
Cambridge University Press
... associated with liberal democracies than with authoritarian systems. Chinese central officials cautiously...

173
Published 2020
Springer International Publishing
Table of Contents: ...Logics to reason formally about trust computation and manipulation -- An Authorization framework...

174
by Tijms, Arjan, Bais, Teo, Keil, Werner
Published 2022
Apress
Table of Contents: ... Authorization -- 5: Jakarta Security -- 6: Java SE Underpinnings -- 7: EE Implementations -- 8: MicroProfile JWT...

176
by Bihis, Charles
Published 2015
Packt Publishing
Table of Contents: ...Refresher on the implicit grant flowA closer look at the implicit grant flow; Authorization request...

177
by Landman, Todd
Published 2013
Bloomsbury Academic
Subjects: ...Authoritarianism...

178
by Tapscott, Rebecca
Published 2021
Oxford University Press
Subjects: ...authoritarian regimes, checks and balances, comparative politics, institutionalized arbitrariness...

180
by Mounk, Yascha
Published 2018
Havard University Press
Subjects: ...Authoritarianism...