WS-Security

Results: 388



#Item
1DATASHEET  WEB SECURITY (WS) WEB SECURITY FROM CENSORNET PROVIDES PROTECTION FROM HARMFUL, OFFENSIVE OR INAPPROPRIATE CONTENT AS WELL AS MANAGING TIME SPENT ON WEBSITES THAT CAN HAVE A SIGNIFICANT

DATASHEET WEB SECURITY (WS) WEB SECURITY FROM CENSORNET PROVIDES PROTECTION FROM HARMFUL, OFFENSIVE OR INAPPROPRIATE CONTENT AS WELL AS MANAGING TIME SPENT ON WEBSITES THAT CAN HAVE A SIGNIFICANT

Add to Reading List

Source URL: www.censornet.com

Language: English - Date: 2017-06-09 09:42:04
    2Work- and Job-related Stress, Emotions, and Performance in Critical Situations An interdisciplinary study in the context of airport security Chiara Bassetti, Roberta Ferrario and Cinzia Giorgetta (chiara.bassetti, robert

    Work- and Job-related Stress, Emotions, and Performance in Critical Situations An interdisciplinary study in the context of airport security Chiara Bassetti, Roberta Ferrario and Cinzia Giorgetta (chiara.bassetti, robert

    Add to Reading List

    Source URL: ceur-ws.org

    Language: English - Date: 2015-08-07 07:25:25
      33rd International Workshop on Science Gateways for Life Sciences (IWSG 2011), 8-10 JUNEGranular Security for a Science Gateway in Structural Bioinformatics ´ Sandra Gesing1∗, Richard Grunzke2∗ , Akos

      3rd International Workshop on Science Gateways for Life Sciences (IWSG 2011), 8-10 JUNEGranular Security for a Science Gateway in Structural Bioinformatics ´ Sandra Gesing1∗, Richard Grunzke2∗ , Akos

      Add to Reading List

      Source URL: ceur-ws.org

      Language: English - Date: 2011-12-19 06:58:36
        4Web Engineering Security and Forensics Education v11

        Web Engineering Security and Forensics Education v11

        Add to Reading List

        Source URL: ceur-ws.org

        - Date: 2010-06-24 06:51:12
          5A Model for Structuring and Reusing Security Requirements Sources and Security Requirements Christian Schmitt1 and Peter Liggesmeyer2, 3 1

          A Model for Structuring and Reusing Security Requirements Sources and Security Requirements Christian Schmitt1 and Peter Liggesmeyer2, 3 1

          Add to Reading List

          Source URL: ceur-ws.org

          - Date: 2015-03-12 04:54:52
            61. - Preliminaries Throughout this document, we will assume that the reader is already familiar with the basic concepts of BioMoby. For more information about BioMoby, please refer to the official documentation.i This do

            1. - Preliminaries Throughout this document, we will assume that the reader is already familiar with the basic concepts of BioMoby. For more information about BioMoby, please refer to the official documentation.i This do

            Add to Reading List

            Source URL: biomoby.open-bio.org

            Language: English - Date: 2007-09-05 19:15:00
            7IHE_ITI_Suppl_DEN_Rev1.1_TI_2011-08-19

            IHE_ITI_Suppl_DEN_Rev1.1_TI_2011-08-19

            Add to Reading List

            Source URL: www.ihe.net

            Language: English - Date: 2011-08-19 12:49:37
            8The Emergence of Application Logic Compilers Stefan Dipper, SAP BW Development Sept, 2013  Public

            The Emergence of Application Logic Compilers Stefan Dipper, SAP BW Development Sept, 2013 Public

            Add to Reading List

            Source URL: hpts.ws

            Language: English - Date: 2013-10-02 05:22:36
            9issued  buffer overrun validated

            issued buffer overrun validated

            Add to Reading List

            Source URL: www.soaschool.com

            Language: English - Date: 2013-01-08 15:18:19
            10trust claims tokens XML-Encryption

            trust claims tokens XML-Encryption

            Add to Reading List

            Source URL: www.soaschool.com

            Language: English - Date: 2013-01-08 15:17:27