Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
CAP.3 Marco Bottalico1.ppt | 2007-12-05 17:05 | 613K | ||
COSTRUIRE SISTEMI IN SICUREZZA.pdf | 2007-12-05 12:09 | 121K | ||
COSTRUIRE SISTEMI IN SICUREZZA.ppt | 2007-12-05 15:38 | 109K | ||
Evaluating systems.ppt | 2007-12-07 11:37 | 588K | ||
Goals for authentication and key establishment.ppt | 2007-12-05 15:39 | 233K | ||
Malicious_logic.ppt | 2007-12-06 09:29 | 296K | ||
NETWORK SECURITY.ppt | 2007-12-07 10:15 | 223K | ||
Program Security - Alessandro Berchicci -.ppt | 2007-12-13 08:36 | 670K | ||
Program Security.ppt | 2007-12-12 11:16 | 119K | ||
SECURE PROGRAMMING.ppt | 2007-12-06 14:39 | 176K | ||
Tecniche di controllo formale.ppt | 2007-12-13 08:34 | 97K | ||
User Security.ppt | 2007-12-07 09:47 | 486K | ||
non-interferenza-cap8.ppt | 2007-12-12 14:23 | 1.6M | ||
seminario sicurezza e privacy cap_1 Romualdo_Trovato.ppt | 2007-12-05 17:18 | 403K | ||
trust-santini.ppt | 2007-11-22 11:35 | 3.2M | ||