1
by Forta, Ben
Published 2018
Addison-Wesley
Subjects: ...Regular expressions (Computer science) / http://id.loc.gov/authorities/subjects/sh2018002310...

2
by Braddon, Laurence
Published 1721
printed for, and sold by Tho. Warner, in Pater-Noster-Row, and Joseph Fox, in Westminster-Hall

3
by Braddon, Laurence
Published 1721
Printed for and sold by Tho. Warner ... and Joseph Fox
...Regular government and judicious employment of the poor, the most probable means of raising...

4
Published 2018
The World Bank
...The European Union (EU) Regular Economic Report (RER), is an annual publication of the World Bank...

5
by Muharremi, Robert, Ramadani, Alisa
Published 2024
Palgrave Macmillan
Table of Contents: ..., and the Kosovo Protection Corps -- 4. Kosovo’s Independence and the Kosovo Security Force -- 5. From Kosovo...

6
Published 2018
The World Bank
... for more secure long-term growth. External imbalances have been high but mostly stable. The risks clouding...

7
Published 2020
Springer International Publishing
Table of Contents: ...DETIPS 2020: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital...

8
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber...

9
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

10
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

11
by Windham, K. Matthew
Published 2018
SAS Institute
Table of Contents: ... and Data; SAS University Edition; Acknowledgments; Chapter 1: Getting Started with Regular Expressions...

12
Published 2021
Springer International Publishing
Subjects: ...Data and Information Security...

13
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

14
Published 2017
Springer International Publishing
Table of Contents: ...Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics...

15
Published 2013
Springer International Publishing
Table of Contents: ...System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization...

16
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues...

17
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

18
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol...

19
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...

20
Published 2020
Springer International Publishing
Table of Contents: ... -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against...