×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [trusted users]
Home >
trusted users
RCAHMS digital archive
1.003 views
Faronics Anti-executable Standard User Guide
153 views
Effective Practices in Wireless Security for Higher Ed
772 views
Live #blogging #thenextbigthing with @blyve
1.333 views
Business Impact (Nordic APIS April 2014)
107 views
Lect13 security
69 views
Accumulo Summit 2015: Attempting to answer unanswerable questions: Key management in Accumulo for Encryption at Rest [Security]
117 views
MWC Mobile Interoperability and Business Productivity (Yury Buluy)
136 views
Binary Component Adaptation Ralph Keller and Urs Hölzle Dept. of Computer Science University of California, Santa Barbara 1998.
217 views
- 1 -. - 2 - New opportunities More types of information available More willingness of users to contribute New application areas –Friends, pictures,
215 views
Doctoral Milestones .
224 views
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
217 views
< Previous
Next >