[图书][B] Cryptography in C and C++

M Welschenbach - 2017 - books.google.com
This book covers everything you need to know to write professional-level cryptographic
code. This expanded, improved second edition includes about 100 pages of additional …

Deployment of service oriented architecture for a business community

P Baglietto, M Maresca, A Parodi… - Proceedings. Sixth …, 2002 - ieeexplore.ieee.org
This paper describes the deployment of a service oriented architecture in the specific context
of the" business communities" ie communities of heterogeneous actors that cooperate in the …

[PDF][PDF] UNICORE: Beyond web-based job-submission

M Romberg - Proceedings of the 42nd Cray User Group Conference, 2000 - cug.org
Abstract UNICORE (Uniform Interface to Computer Resources) is a software infrastructure to
support a uniform, secure Web-based access to distributed resources. The talk will give an …

[PDF][PDF] Toward using intelligent agents to detect, assess, and counter cyberattacks in a network-centric environment

MR Stytz, DE Lichtblau, SB Banks - Ft. Belvoir Defense Technical …, 2005 - researchgate.net
The network-centric warfare philosophy is becoming more firmly entrenched in US military
doctrine and operations. As a result, the state and trustworthiness of the network and its …

[PDF][PDF] Multi-agent system security for mobile communication

N Borselius - 2003 - Citeseer
This thesis investigates security in multi-agent systems for mobile communication. Mobile as
well as non-mobile agent technology is addressed. A general security analysis based on …

A mobile and portable trusted computing platform

S Nepal, J Zic, D Liu, J Jang - EURASIP Journal on Wireless …, 2011 - Springer
The mechanism of establishing trust in a computing platform is tightly coupled with the
characteristics of a specific machine. This limits the portability and mobility of trust as …

Stepwise deployment methodology of a service oriented architecture for business communities

P Baglietto, M Maresca, A Parodi, N Zingirian - Information and Software …, 2005 - Elsevier
This paper describes the deployment of a Service Oriented Architecture in the specific
context of the 'Business Communities', ie Communities of heterogeneous actors that …

[图书][B] Web Security

A Tiwana - 1999 - books.google.com
Cutting through the hype and hoopla of information theft and Website and server break-ins,
this guide provides readers with the same tools digital saboteurs use. Here is an in-depth …

[图书][B] Organizational behavior and virtual work: Concepts and analytical approaches

AK Birdie, M Jain - 2017 - taylorfrancis.com
With the globalization of work and technological advancements in recent years, and with
emphasis on service quality today, organizations have changed. Virtual work has emerged …

[图书][B] Kryptographie in C und C++: zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools

M Welschenbach - 2013 - books.google.com
Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner
kryptographischer Verfahren und ihre programmtechnische Entwicklung mit Hilfe einer …