Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-10 ل  122 نتائج ل ""security policy""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security Policy.

  • Source: Information Security Journal: A Global Perspective. Jan2010, Vol. 19 Issue 2, p100-108. 9p. 5 Charts.

تفاصيل العنوان

×
  • 1-10 ل  122 نتائج ل ""security policy""