×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security critical]
Achieving software security assurance in ICS applications
1.273 views
Introduction To Cloud Computing
3.638 views
The New Economy – An Engineers Perspective Sir David Brown Chairman, Motorola Ltd
213 views
Spark as a Platform to Support Multi-Tenancy and Many Kinds of Data Applications-(Kelvin Chu, Uber)
642 views
Seamless Mobility & OSGi Service Platform - Mala Chandra, Motorola, Inc
16 views
A NALYTICS D ECISIVE A NALYTICS 1 Introduction to the Common Criteria and the Underlying Concepts of Trust in Computer Systems Michael McEvilley SIGAda
215 views
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk
215 views
Quarantine: A Framework to Mitigate Memory Errors in JNI Applications Du Li , Witawas Srisa-an University of Nebraska-Lincoln
220 views
Www.adacore.com A Pragmatic View of Formal Methods The Hi-Lite Project Robert B K Dewar SSS ‘11 President & CEO, AdaCore Emeritus Professor of Computer
214 views
ADM364 SMS Feature Packs – Today, Tomorrow, and Beyond! Martin Dey Senior Product Manager Enterprise Management Division
221 views
Michael Blackin Sales Consulting Director
34 views
Introduction to the Common Criteria and the Underlying Concepts of Trust in Computer Systems
14 views