Search

Your search keyword '"Filesystem Hierarchy Standard"' showing total 57 results

Search Constraints

Start Over You searched for: Descriptor "Filesystem Hierarchy Standard" Remove constraint Descriptor: "Filesystem Hierarchy Standard"
57 results on '"Filesystem Hierarchy Standard"'

Search Results

1. Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing

2. An Efficient File Hierarchy Attribute Based Encryption Using Optimized Tate Pairing Construction in Cloud Environment

3. Files of a Feather Flock Together? Measuring and Modeling How Users Perceive File Similarity in Cloud Storage

4. Secure Cloud Encryption Using File Hierarchy Attribute

5. Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security

6. Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks

7. An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing

8. Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud

9. Creating Functions in Azure Functions

11. Moving around the Filesystem

12. A Novel File Hierarchy Access Control Scheme Using Attribute-Based Encryption

13. An Analysis of the File System for Linux

14. BTRFS

15. A Summary of Research on the Linux Operating System

16. MOOC (massive open online course) with efficient file hierarchy in cloud

17. Design and Implementation of Module Hot-Plugging in Equipment Management Platform

18. Installing Perl on Linux

19. Topic 104: Devices, Linux Filesystems, and the Filesystem Hierarchy Standard

20. Auditing UNIX/Linux

21. Unix Survival Guide

22. Basic bash Shell Commands

23. Embedded File System for Ubiquitous Computing

24. No Unix/Linux Port of Entry

25. Contextualization : dynamic configuration of virtual machines

26. Unix Filesystem Security

27. Orthogonal striping and mirroring in distributed RAID for I/O-centric cluster computing

28. A Linux Filesystem Performance Analysis Tool

29. The Linux operating system: Debian GNU/Linux

30. Linux How To’s

31. Improving navigation-based file retrieval

32. Appendix C. Introduction to the UNIX/Linux programming environment

33. Subject and object sensitivity label of Linux

34. Hypervisor-based protection of sensitive files in a compromised system

35. Systemprogrammierung in UNIX / Linux

36. Single System Image clustering using Kerrighed

37. UNIX Operating System

38. The Shadow Uniform Resource Locator: Standardizing Citations of Electronically Published Materials

39. Linux and Unix Security

40. Unix and Linux Security

41. Managing Linux, UNIX, and Solaris

42. Real-Time Linux

43. Pen-Testing Unix

44. A Real Time Simulation Using Linux Converted from a Unix Application

45. Essential UNIX (and Linux) for the Oracle DBA

46. Continuous media filesystem services on a real-time JAVA server

47. UNIX Filesystem Management

48. UNIX Filesystem Layout

49. Linux and the Web

50. Design and analysis of clusters with single I/O space

Catalog

Books, media, physical & digital resources