1
0
0
(1 - 30 von 39
)
marcel winandy - ZVAB
www.zvab.com
ZVAB ist ein weltweiter Internet-Marktplatz für neue, gebrauchte, antiquarische und vergriffene Bücher
Marcel Winandy - AbeBooks
www.abebooks.co.uk
Revue Politique et Parlementaire. N° 613, décembre Contient entre autres : Ttribune Politique : Le Deux Décembre, par Marcel Plaisant (6 pages).
Bücher.de
www.buecher.de
... Marcel Winandy. Produktdetails. Produktdetails; Verlag: Hanser Fachbuchverlag; Artikelnr. des Verlages: ; Erscheinungstermin: 10. Juni 2022; Deutsch ,0(1) · 39,99 € Rezensionen werden von der Google Suche nicht überprüft
IT-SicherheitHANSER eLibrary
www.hanser-elibrary.com
Marcel Winandy. Pages 219–239. First Page · PDF. No Access. IT-Sicherheit in Vergabeverfahren · Jutta Pertenaïs. Pages 241–261. First Page · PDF. No Access ... › doi › book
Android Security Cookbook - Google Books-Ergebnisseitegoogle.de
books.google.de
... , and Marcel Winandy at http://cseweb.ucsd.edu/~hovav/dist/noretccs.pdf The ReturnOriented Programming without Returns on ARM guide by Lucas Davi ...
Electronic Healthcare: Third International Conference, ...google.de
books.google.de
... Marcel Winandy Horst Görtz Institute for IT Security Ruhr-University Bochum, Germany .de Abstract. The German compulsory health ...
ISSE Securing Electronic Business Processes: Highlights ...google.de
books.google.de
... reliable Security Architecture for Device Encryption and Ammar Alkassar, Michael Scheibel, Christian Stüble, Ahmad-Reza Sadeghi, Marcel Winandy
IT-Sicherheit: Technologien und Best Practices für die ...google.de
books.google.de
... Marcel Winandy hilft Menschen, innovativ zu sein und die Ideen zu maximieren, für die sie sich begeistern. Seit arbeitet und forscht er im Bereich IT ...
Trust and Trustworthy Com…ng: Third International ...google.de
books.google.de
... Marcel Winandy Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany .de Abstract ...
Trusted com…ng für adaptive Automobilsteuergeräte im ...google.de
books.google.de
... Marcel Winandy. Tcg inside?: a note on tpm specification compliance. In STC '06: Proceedings of thefirst ACM workshop on Scalable trusted com…ng, pages ...
Electronic Healthcare: Third International Conference, ...google.com
books.google.com
... Card Management System of the German E-Health Card Marcel Winandy Horst Görtz Institute for IT Security Ruhr-University Bochum, Germany marcel.winandy ...
Handbook of Financial Cryptography and Securitygoogle.com
books.google.com
Acknowledgment We are very grateful to Christian Stüble and in particular to Hans Löhr and Marcel Winandy for the fruitful discussions and their valuable ...
ISSE Securing Electronic Business Processes: Highlights ...google.com
books.google.com
Michael Scheibel'. Christian Stüble" Ahmad-Reza Sadeghi'. Marcel Winandy” 'Sirrix AG Security Technologies (a.alkassar |m.scheibel} ...
ISSE 2015: Highlights of the Information Security Solutions ...google.com
books.google.com
[EMSCB] [GrWi12] [GrSc11] [HASK08] European Multilaterally Secure Com…ng Base, http://www.emscb.de Michael Gröne, Marcel Winandy, “Applying a Security ...
Trust and Trustworthy Com…ng: Third International ...google.com
books.google.com
... and Marcel Winandy Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany {ahmad.sadeghi,thomas.schneider,marcel.winandy}@ ...
Trusted com…ng für adaptive Automobilsteuergeräte im ...google.com
books.google.com
[223] Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, and Marcel Winandy. Tcg inside?: a note on tpm specification compliance.
Android Security Cookbook - Keith Makan, Scott Alexander-Bown -...
books.google.de
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of...
Electronic Healthcare: Third International Conference, eHealth
books.google.de
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference, eHealth 2010, held in Casablanca, Morocco, in...
Handbook of Financial Cryptography and Security - Google Books
books.google.de
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and il…rates how to establish and maintain security...
ISSE 2015: Highlights of the Information Security Solutions Europe...
books.google.de
This book presents the most interesting talks given at ISSE – the forum for the interdisciplinary discussion of the key European Commission security...
Integrity and Internal Control in Information Systems V: IFIP TC
books.google.de
PROTECTING JAVA COMPONENT INTEGRITY AGAINST TROJAN HORSE PROGRAMS Marcel Winandy, Armin B. Cremers, Hanno Langweg and Adrian ...
Trust and Trustworthy Com…ng: Third International Conference,...
books.google.de
... Sadeghi, Thomas Schneider, and Marcel Winandy Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany {ahmad.sadeghi,thomas.schneider ...
ISSE 2015: Highlights of the Information Security Solutions ...books.google.fi › books
books.google.fi
... [HASK08] European Multilaterally Secure Com…ng Base, http://www.emscb. de Michael Gröne, Marcel Winandy, “Applying a Security Kernel Framework to ...
Android Security Cookbook - Google Books-Ergebnisseite
books.google.de
... Hovav Shacham, and Marcel Winandy at http://cseweb.ucsd.edu/~hovav/dist/noretccs.pdf The ReturnOriented Programming without Returns on ARM guide by ...
Electronic Healthcare: Third International Conference, ...books.google.com › books
books.google.by
... Security in the Card Management System of the German E-Health Card Marcel Winandy Horst Görtz Institute for IT Security Ruhr-University Bochum, Germany ...
Engineering Secure Two-Party Com…tion Protocols: Design, ...books.google.com › books
books.google.de
... Stephan Krenn, Riccardo Lazzeretti, Stephen C. Williams, Marcel Winandy) for the splendid exchange of mutually stimulating ideas. Special thanks also to the ...
Trusted Systems: 5th International Conference, INTRUST 2013, Graz,...
books.google.de
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz,...
ISSE Securing Electronic Business Processes: Highlights of the...
books.google.de
This book presents the most interesting talks given at ISSE the forum for the interdisciplinary discussion of how to adequately secure electronic...
sortiert nach Relevanz / Datum