|
|
|
|
| | | | Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... |
|
| | | | Scheduling in Real-Time SystemsReal-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today.... |
|
|
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 |