1
0
0
(1 - 30 von 43
)
Security in E-Learning[ SECURITY IN E-LEARNING ] By Weippl, Edgar R. ( Author )Jul Hardcover
von Edgar R. Weippl, Springer, 2005, Gebundene Ausgabe
Security in E-Learning von Edgar R. Weippl als eBook bei ciando
www.ciando.com
Kaufen Sie das Buch Security in E-Learning vom Springer-Verlag als eBook auf ciando.com - dem führenden Portal für elektronische Fachbücher und Belletristik.
Edgar Weippl (Editor of Contemporary Challenges and Solutions for ...www.goodreads.com › Edgar_Weippl
www.goodreads.com
Edgar Weippl is the author of Contemporary Challenges and Solutions for Mobile and Multimedia Technologies (4.00 avg rating, 1 rating, 0 reviews, publish...
Information Security Governance (eBook, PDF) von Rossouw Solms; S. H....
www.buecher.de
IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats,...
Buch24.de: Weippl%20Edgar%20R.
www.buch24.de
Entdecken Sie alles zum Thema 'Weippl%20Edgar%20R.', bestellen Sie versandkostenfrei im Online-Shop von Buch24.de.
Availability, Reliability, and Security in Information Systems: IFIP...
books.google.de
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and...
Availability, Reliability, and Security in Information Systems: ...books.google.com › books
books.google.de
Proceedings Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl ... relationships on Facebook or LinkedIn; their interests such as video, image or music ...
Computer Security -- ESORICS 2015: 20th European Symposium ...books.google.com › books
books.google.ae
, 2015, Proceedings Günther Pernul, Peter Y A Ryan, Edgar Weippl ... social plugins of Facebook, Twitter, Google Plus, LinkedIn, Tumblr, and Pinterest.
eBook: Hardware Malware von Edgar Weippl | ISBN |...
www.lehmanns.de
Hardware Malware von Edgar Weippl, Christian Krieg, Adrian Dabrowski, Heidelinde Hobel (ISBN ) online kaufen | Sofort-Download - lehmanns.de
Computer Security -- ESORICS 2015: 20th European Symposium on...
books.google.de
The two-volume set, LNCS and LNCS constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015,...
Information Systems Security and Privacy: First International...
books.google.de
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers,...
Machine Learning and Knowledge Extraction: First IFIP TC 5, WG 8.4,...
books.google.com.ua
This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, International Cross-Domain Conference for Machine Learning and Knowledge...
Empirical Research for Software Security: Foundations and Experience -
www.routledge.com
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert kn
Multidisciplinary Research and Practice for Informations Systems:...
books.google.de
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability...
Machine Learning and Knowledge Extraction: First IFIP TC 5, WG ...books.google.com › books
books.google.de
... Proceedings Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl LinkedIn Pulse
Availability, Reliability, and Security in Information Systems and...
books.google.de
... CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu ...
Peter Gaži, Research papers - IOHK Research
iohk.io
Aljosha Judmayer,Nicholas Stifter,Alexei Zamyatin,Itay Tsabary,Peter Gaži,Sarah Meiklejohn,Edgar Weippl. February 2021, Workshop on Trusted Smart Contracts ...
Encyclopedia of Business Analytics and Optimization - Google Books
books.google.de
As the age of Big Data emerges, it becomes necessary to take the five dimensions of Big Data- volume, variety, velocity, volatility, and veracity- and focus...
Enterprise Information Systems V - Google Books
books.google.de
Oscar Mangisengi, Wolfgang Essmayr, Johannes Huber, Edgar Weippl Software Competence Center Hagenberg (SCCH)A Hagenberg, ...
Hardware Malware - Edgar Weippl, Christian Krieg, Adrian Dabrowski,...
books.google.de
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving...
eleed
eleed.campussource.de
Weippl, Edgar R. Contributions in eleed. Document Actions. sendto; print; Security in E-Learning. Edgar R. Weippl; eleed, Iss. 3. read; Imprint; Internal.
Die Fakultät für Informatik/The Faculty of Informatics:...
books.google.de
Die Fakultat fur Informatik an der Technischen Universitat Wien steht fur Exzellenz in der Forschung, Qualitat in der Lehre und Leidenschaft in der Innovation....
Security in E-Learning - Edgar R. Weippl - Google Books
books.google.de
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic....
Quality Of Protection: Security Measurements and Metrics - Google...
books.google.de
... Strigini Ketil Stlen Edgar Weippl Artsiom Yautsiukhin Marvin Zelkowitz Local Organization Fabio Massacci Artsiom Yautsiukhin Why to adopt a security metric?
Information Systems Security and Privacy - Dymocks
www.dymocks.com.au
... ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. PaperBack by Olivier Camp, Edgar Weippl, Christophe Bidan, Esma Aïmeur. › book
Software and Data Technolgoies: Third International Conference,...
books.google.de
... UK Bing Wang, UK Christiane Gresse von Wangenheim, Brazil Edgar Weippl, Austria Danny Weyns, Belgium Ing Widya, The Netherlands Dietmar Wikarski, ...
sortiert nach Relevanz / Datum