Search alternatives:
regularity » regularly

1
by Forta, Ben
Published 2018
Addison-Wesley
Subjects: ...Regular expressions (Computer science) / http://id.loc.gov/authorities/subjects/sh2018002310...

2
by Braddon, Laurence
Published 1721
printed for, and sold by Tho. Warner, in Pater-Noster-Row, and Joseph Fox, in Westminster-Hall

3
by Braddon, Laurence
Published 1721
Printed for and sold by Tho. Warner ... and Joseph Fox
...Regular government and judicious employment of the poor, the most probable means of raising...

4
Published 2018
The World Bank
...The European Union (EU) Regular Economic Report (RER), is an annual publication of the World Bank...

5
by Muharremi, Robert, Ramadani, Alisa
Published 2024
Palgrave Macmillan
Table of Contents: ..., and the Kosovo Protection Corps -- 4. Kosovo’s Independence and the Kosovo Security Force -- 5. From Kosovo...

6
Published 2023
The World Bank
... and nutrition security. Most WB6 countries have recently included agriculture greening in their development...

7
Published 2018
The World Bank
... for more secure long-term growth. External imbalances have been high but mostly stable. The risks clouding...

8
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

9
Published 2020
Springer International Publishing
Table of Contents: ...DETIPS 2020: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital...

10
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

12
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

13
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues...

14
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

15
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...

16
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

17
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Address -- A: The Environment and Security Nexus -- Environment and Security in International Politics...

18
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against...

19
Published 2021
Springer International Publishing
Table of Contents: ... Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled...

20
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...CSS 2012 Regular Papers -- Session 1: Mobile Security -- Identity and Its Authentication Protocol...