𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering] Forensics in Telecommunications, Information, and Multimedia Volume 56 || Research on the Application Security Isolation Model

✍ Scribed by Lai, Xuejia; Gu, Dawu; Jin, Bo; Wang, Yongquan; Li, Hui


Book ID
120382635
Publisher
Springer Berlin Heidelberg
Year
2011
Weight
220 KB
Category
Article
ISBN
3642236022

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes of the Institute for Comp
✍ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 222 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andse

[Lecture Notes of the Institute for Comp
✍ Pentikousis, Kostas; AgΓΌero, RamΓ³n; GarcΓ­a-Arranz, Marta; Papavassiliou, Symeon πŸ“‚ Article πŸ“… 2011 πŸ› Springer Berlin Heidelberg 🌐 German βš– 1015 KB

This Book Constitutes The Thoroughly Refereed Post-conference Proceedings Of The Second International Icst Conference On Mobile Networks And Management, Monami 2010, Held In Santander, Spain In September 2010. The 29 Revised Full Papers Presented Were Carefully Reviewed And Selected For Inclusion In