181
by Coar, Ken A. L.
Published 2008
O'Reilly
Table of Contents: ..., Redirecting, and Rewriting -- 6. Security -- 7. SSL -- 8. Dynamic Content -- 9. Error Handling -- 10. Proxies...

182
Published 2005
Springer Berlin Heidelberg
Subjects: ...Security Science and Technology...

183
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange...

184
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet...

185
by Saddiki, Said
Published 2017
Open Book Publishers
Subjects: ...border security...

186
Published 2015
Springer International Publishing
Table of Contents: ... and Security Perceptions of European Citizens: A Test of the Trade-Off Model -- Privacy and Confidentiality...

187
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... on, Tracking and Controlling How their Data are Used? -- Privacy Versus Collective Security: Drivers...

188
by Pinto, Rohan
Published 2024
Packt Publishing, Limited
Table of Contents: ...User lifecycle management and secure data-sharing practices -- Secure authentication practices...

189
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop...

190
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Security Analysis of the Iterated Even-Mansour Cipher -- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound...

191
by Garbade, Kenneth D.
Published 2012
MIT Press
Subjects: ...Government securities / United States / History...

192
by Sinha, Sanjib
Published 2017
Apress
Table of Contents: ... – How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 – Exceptions, Catching...

193
by Ferrari, Luca, Pirozzi, Enrico
Published 2023
Packt Publishing Ltd.
... server-side programs, to configuring, managing, securing, and optimizing database performance. This new...

194
by Sinha, Sanjib
Published 2017
Apress
Table of Contents: ... -- How Loops Make Your Life Easier -- Chapter 12 -- Regular Expressions Chapter 13 -- Exceptions...

195
by Swanson, Norman R.
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...dynamic analysis of securities...

196
by Haunts, Stephen
Published 2019
Apress
Subjects: ...Data and Information Security...

197
by Chinkin, C. M., Kaldor, Mary
Published 2017
Cambridge University Press
Table of Contents: ... : peacemaking, peacekeeping, and peacebuilding -- Justice and accountability -- Second generation human security...

198
Published 2023
Springer Nature Singapore
Table of Contents: ...-Solver — An Exercise in A2I -- Chapter 10. Regular matching with constraint programming -- Chapter 11...

200
Published 2017
Springer Nature Singapore
Table of Contents: .... Comparative Analysis of Integer and Fractional Order Controller for Time Delay System -- Chapter 35. A Secure...