pencarian buku
buku
Mendukung
Masuk
Masuk
pengguna terdaftar memiliki akses ke:
rekomendasi pribadi
Bot Telegram
riwayat unduhan
mengirim ke alamat email atau Kindle
manajemen daftar buku
penyimpanan ke Favorit
Pribadi
Permintaan untuk buku
Pengkajian
Z-Recommend
Daftar buku
Yang paling populer
Kategori
Partisipasi
Mendukung
Unggahan
Litera Library
Menyumbangkan buku kertas
Menambah buku kertas
Search paper books
LITERA Point saya
Pencarian kata kunci
Main
Pencarian kata kunci
search
1
Application of Risk Management for IT-Networks Incorporating Medical Devices. Step-by-Step Risk Management of Medical IT-Networks. Practical Applications and Examples
British Standards Institute
British Standards Institute Staff
risk
iec
network
step
hazardous
measures
patient
probability
severity
unintended
causes
situations
effectiveness
device
residual
report
technical
hazard
consequence
analysis
evaluate
devices
implementation
overall
security
clinician
identify
hazards
monitoring
figure
switch
examples
failure
remote
risks
configuration
connectivity
responsible
standards
hs01
isk
acceptable
defined
networks
organization
annex
determine
acceptability
estimate
key
Tahun:
2012
Bahasa:
english
File:
PDF, 1.68 MB
Tag Anda:
0
/
5.0
english, 2012
2
ETSI TS 102 594 V1.2.0 Methods for Testing and Specification (MTS); Internet Protocol Testing (IPT): IPv6 Security; Conformance Abstract Test Suite (ATS) and partial Protocol Implementation eXtra Information for Testing (PIXIT) proforma
etsi
testing
protocol
conformance
pixit
specification
proforma
v1.2.0
iut
pctr
annex
iec
security
identification
abstract
algorithm
ipv6
cleanup
laboratory
esp
ikev2
partial
reference
version
clause
core
references
implementation
mobility
summary
encryption
hs02
methods
mts
referenced
report
purposes
tunnel
client
contained
figure
integrity
normative
ttcn
cnut
comments
essential
ipt
key
method
Bahasa:
english
File:
PDF, 106 KB
Tag Anda:
0
/
0
english
3
Public Key Broadcast Encryption for Stateless Receivers
Dodis Fazio
key
keys
users
encryption
subset
method
broadcast
security
hibe
setting
nnl01
ê
lsd
params
ciphertext
id1
hierarchical
idt
random
schemes
storage
decrypt
sij
subsets
algorithm
decryption
efficient
symmetric
identifier
encrypt
adversary
extract
setup
gs02
node
assignment
corresponding
methods
naor
pij
transmission
ancestor
berlin
cca1
framework
input
lncs
proposed
springer
verlag
Bahasa:
english
File:
PDF, 222 KB
Tag Anda:
0
/
0
english
1
Pindah ke
tautan ini
atau temukan bot "@BotFather" di Telegram
2
Kirimlah perintah /newbot
3
Masukkan nama untuk bot Anda
4
Masukkan nama pengguna untuk bot
5
Salin pesan terbaru dari BotFather dan masukkannya di sini
×
×