![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | CAP.3 Marco Bottalico1.ppt | 2007-12-05 17:05 | 613K | |
![]() | COSTRUIRE SISTEMI IN SICUREZZA.pdf | 2007-12-05 12:09 | 121K | |
![]() | COSTRUIRE SISTEMI IN SICUREZZA.ppt | 2007-12-05 15:38 | 109K | |
![]() | Evaluating systems.ppt | 2007-12-07 11:37 | 588K | |
![]() | Goals for authentication and key establishment.ppt | 2007-12-05 15:39 | 233K | |
![]() | Malicious_logic.ppt | 2007-12-06 09:29 | 296K | |
![]() | NETWORK SECURITY.ppt | 2007-12-07 10:15 | 223K | |
![]() | Program Security - Alessandro Berchicci -.ppt | 2007-12-13 08:36 | 670K | |
![]() | Program Security.ppt | 2007-12-12 11:16 | 119K | |
![]() | SECURE PROGRAMMING.ppt | 2007-12-06 14:39 | 176K | |
![]() | Tecniche di controllo formale.ppt | 2007-12-13 08:34 | 97K | |
![]() | User Security.ppt | 2007-12-07 09:47 | 486K | |
![]() | non-interferenza-cap8.ppt | 2007-12-12 14:23 | 1.6M | |
![]() | seminario sicurezza e privacy cap_1 Romualdo_Trovato.ppt | 2007-12-05 17:18 | 403K | |
![]() | trust-santini.ppt | 2007-11-22 11:35 | 3.2M | |