trusted computing online kopen

Ben je op zoek naar trusted computing? Bekijk onze boeken selectie en zie direct bij welke webshop je trusted computing online kan kopen. Ga je voor een ebook of paperback van trusted computing. Zoek ook naar accesoires voor trusted computing. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je trusted computing met korting of in de aanbieding. Alles voor veel leesplezier!

Trusted Computing

of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check;

Vergelijkbare producten zoals Trusted Computing

Trusted Systems

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST;

Vergelijkbare producten zoals Trusted Systems

Trusted Computing for Embedded Systems

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted;

Vergelijkbare producten zoals Trusted Computing for Embedded Systems

Socially Enhanced Services Computing

trusted dynamic compositions of Human-provided Services and Software-based services, thus empowering new interaction models and processes;

Vergelijkbare producten zoals Socially Enhanced Services Computing

Trust and Trustworthy Computing

42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and;

Vergelijkbare producten zoals Trust and Trustworthy Computing

Autonomic and Trusted Computing

in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted;

Vergelijkbare producten zoals Autonomic and Trusted Computing

Trust and Trustworthy Computing

organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically;

Vergelijkbare producten zoals Trust and Trustworthy Computing

Trusted Systems

?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted;

Vergelijkbare producten zoals Trusted Systems

Financial Cryptography and Data Security

Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC;

Vergelijkbare producten zoals Financial Cryptography and Data Security

Information Computing and Applications Part I

comp- ing, scalable computing, trusted computing, autonomy-oriented computing, evolutionary computing, mobile computing, computational;

Vergelijkbare producten zoals Information Computing and Applications Part I

Assured Cloud Computing

configuration of any dynamic systems-of-systems that contain both trusted and partially trusted resources and services sourced from multiple;

Vergelijkbare producten zoals Assured Cloud Computing

On the Move to Meaningful Internet Systems OTM 2015 Conferences

2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015;

Vergelijkbare producten zoals On the Move to Meaningful Internet Systems OTM 2015 Conferences

On the Move to Meaningful Internet Systems. OTM 2016 Conferences

2016, Ontologies, Databases, and Applications of Semantics, ODBASE 2016, and Cloud and Trusted Computing, C&TC, held as part of OTM 2016;

Vergelijkbare producten zoals On the Move to Meaningful Internet Systems. OTM 2016 Conferences

On the Move to Meaningful Internet Systems: OTM 2019 Conferences: Confederated International Conferences

, CoopIS 2019, Ontologies, Databases, and Applications of Semantics, ODBASE 2019, and Cloud and Trusted Computing, C&TC, held as part of OTM 2019;

Vergelijkbare producten zoals On the Move to Meaningful Internet Systems: OTM 2019 Conferences: Confederated International Conferences

On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences

Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as;

Vergelijkbare producten zoals On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences

On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences

Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held;

Vergelijkbare producten zoals On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences

Security of Cloud-Based Systems

framework for secure cloud computing; security model for preserving privacy over encrypted cloud computing; trusted heartbeat framework for cloud;

Vergelijkbare producten zoals Security of Cloud-Based Systems

Algorithms and Architectures for Parallel Processing

papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted;

Vergelijkbare producten zoals Algorithms and Architectures for Parallel Processing

National 5 Computing Science Success Guide (Success Guide)

how the new National 5 course and assessments are structured is included. All the popular features of this tried and trusted series are;

Vergelijkbare producten zoals National 5 Computing Science Success Guide (Success Guide)

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing

privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies;

Vergelijkbare producten zoals Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing

privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies;

Vergelijkbare producten zoals Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing

Trusted Cloud Computing

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust;

Vergelijkbare producten zoals Trusted Cloud Computing

Cyber Security

, trusted computing, password cracking, systems security and network security among others.;

Vergelijkbare producten zoals Cyber Security

Cyber Security

, trusted computing, password cracking, systems security and network security among others.;

Vergelijkbare producten zoals Cyber Security

Trust and Trustworthy Computing

, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust;

Vergelijkbare producten zoals Trust and Trustworthy Computing

Computer Architecture and Organization

recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU;

Vergelijkbare producten zoals Computer Architecture and Organization

Einde inhoud

Geen pagina's meer om te laden'