Results 341 to 350 of about 14,651,094 (400)
Some of the next articles are maybe not open access.
Proceedings of the first ACM conference on Data and application security and privacy, 2011
The paper attempts to encourage deeper thinking about the nature of security enforcement policies with the intent of fostering a practical engineering design approach for building security enforcement policy. The paper suggests several approaches to lower the cost of developing security enforcement policies by developing technology to share enforcement
openaire +1 more source
The paper attempts to encourage deeper thinking about the nature of security enforcement policies with the intent of fostering a practical engineering design approach for building security enforcement policy. The paper suggests several approaches to lower the cost of developing security enforcement policies by developing technology to share enforcement
openaire +1 more source
2004
From object basics through design pattern principles, and on to tools and techniques, this book has focused on a single objective: the successful PHP project.
openaire +1 more source
From object basics through design pattern principles, and on to tools and techniques, this book has focused on a single objective: the successful PHP project.
openaire +1 more source
Musculoskeletal Science and Practice, 2020
E. Gattie, J. Cleland, S. Snodgrass
semanticscholar +1 more source
E. Gattie, J. Cleland, S. Snodgrass
semanticscholar +1 more source
2014
Chapter 2 touched on some of the key patterns surrounding API security. This chapter expands on that discussion with more concrete details. Here we present ten API security patterns to address the ten most common enterprise security problems. All of the patterns are derived from the concepts and theories discussed in previous chapters.
openaire +1 more source
Chapter 2 touched on some of the key patterns surrounding API security. This chapter expands on that discussion with more concrete details. Here we present ten API security patterns to address the ten most common enterprise security problems. All of the patterns are derived from the concepts and theories discussed in previous chapters.
openaire +1 more source
Antibody–drug conjugates: Smart chemotherapy delivery across tumor histologies
Ca-A Cancer Journal for Clinicians, 2022Paolo Tarantino +2 more
exaly
Variations in practice patterns
Medical Journal of Australia, 1991M, Renwick, S, Sax
openaire +2 more sources

