Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Slaviero, Marco"'
Autor:
Slaviero, Marco Lorenzo
Address allocation has been a limiting factor in the deployment of multicast solutions, and, as other multicast technologies advance, a general solution to this problem becomes more urgent. This study examines the current state of address allocation
Externí odkaz:
http://hdl.handle.net/2263/27854
http://upetd.up.ac.za/thesis/available/etd-02102005-135651/
http://upetd.up.ac.za/thesis/available/etd-02102005-135651/
Autor:
Granova, Anna, Slaviero, Marco
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:1085-1104
Autor:
Granova, Anna *, Slaviero, Marco **
Publikováno v:
In Cyber Security and IT Infrastructure Protection 2014:205-232
Autor:
Granova, Anna, Slaviero, Marco
Publikováno v:
In Computer and Information Security Handbook Edition: Second Edition. 2013:975-990
Autor:
Slaviero, Marco
Publikováno v:
In SQL Injection Attacks and Defense Edition: Second Edition. 2012:233-288
Autor:
Amoroso, Edward G., Bardin, Jeffrey S., Basile, Cataldo, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Casalino, Matteo Maria, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Dara, Rozita, Day, Christopher, di Vimercati, Sabrina De Capitani, El Maliki, Tewfiq, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Genovese, Angelo, Granova, Anna, Gross, William F., Guan, Yong, Gurkok, Cem, Hao, Feng, Hamed, Tarfa, Harmening, James T., Hoffman, Rich, Huseynov, Emin, Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Korba, Larry, Kotapati, Kameswari, Kremer, Stefan C., LaPorta, Thomas F., Lencrenon, Jean, Lewis, Keith, Liu, Peng, Livraga, Giovanni, Mallery, John R., Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Mims, Nailah, Mutti, Simone, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Santambrogio, Marco, Santana, Mario, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, West, Michael A., Wing, Dan, Yee, George O.M., Yan, Liang, Zabicki, Roman, Zhao, Gansen, Zias, Zhe
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:xxvii-xxx
Publikováno v:
Advances in Digital Forensics II; 2006, p215-228, 14p
Autor:
Bardin, Jeffrey S., Bhaskar, Rahul, Collins, Lauren, Ellis, Scott R., Granova, Anna, Jhawar, Ravi, Kapoor, Bhushan, Martin, Luther, Pandya, Pramod, Piuri, Vincenzo, Santambrogio, Marco, Slaviero, Marco, Spies, Terence, Stallings, William
Publikováno v:
In Cyber Security and IT Infrastructure Protection 2014:xv-xv
Autor:
Agostino Ardagna, Claudio, Bardin, Jeffrey, Bavisi, Sanjay, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Day, Christopher, De Capitani Di Vimercati, Sabrina, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Granova, Anna, Guan, Yong, Gurkok, Cem, Hao, Feng, Harmening, James T., Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Korba, Larry, Kotapati, Kameswari, LaPorta, Thomas F., Lancrenon, Jean, Liu, Peng, Maliki, Tewfiq El, Mallery, John, Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Ramsbrock, Daniel, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Santana, Mario, Schneider, Steve, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, Walsh, Patrick J., Wang, Xinyuan, West, Michael, Wing, Dan, Xia, Zhe, Yee, George O.M., Yan, Liang, Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Second Edition. 2013:xxvii-xxviii