-
1دورية أكاديمية
المؤلفون: Dirk Frank, Peter Riedl
المصدر: Forum: Qualitative Social Research, Vol 5, Iss 2 (2004)
مصطلحات موضوعية: qualitative market research, models of consumer behaviour, world of meaning, world of probability, unconscious clustering method, cybernetics, Social sciences (General), H1-99
وصف الملف: electronic resource
-
2
المؤلفون: Peter Riedl, Wolfgang Thalhammer, Andrea Schuster-Haberhauer, Michael Pohl, Katja Kinzebach
المصدر: Die Pharmaindustrie ISBN: 9783662610343
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::db44233025abd425474336ceea6fbb3e
https://doi.org/10.1007/978-3-662-61035-0_9 -
3
المؤلفون: Peter Riedl
المصدر: Was letztlich zählt – Eschatologie
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::94fbfff559478326ff01c2e5e494472f
https://doi.org/10.13109/9783788734220.182 -
4
المؤلفون: Peter Riedl
المصدر: Was letztlich zählt – Eschatologie
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::fdfe5cabbf81387166bb5bc576796449
https://doi.org/10.13109/9783788734220.184 -
5
المؤلفون: Clemens Holzmann, Rene Mayrhofer, Matthias Kranz, Andreas Möller, Florian Lettner, Marion Koelle, Peter Riedl
المصدر: Personal and Ubiquitous Computing. 19:941-954
مصطلحات موضوعية: Cloud computing security, Computer science, Management Science and Operations Research, Computer security model, Asset (computer security), Security awareness, Computer security, computer.software_genre, Security policy, Security information and event management, Computer Science Applications, Security service, Hardware and Architecture, Human-computer interaction in information security, computer
-
6كتاب إلكتروني
المؤلفون: Benedikt Maria Trappen, Antonio-Maria Caruso, Otfried H. Culmann, Ulrich Dehn, Michael Frensch, Peter Gäng, Michael Gerhard, Peter Michael Hamel, Wilfried Huchzermeyer, Jochen Kirchhoff, Reinhard Kirste, Gerhard Knauss, Zensho Wolfgang Kopp, Yukio Kotani, Mondrian Graf von Lüttichau, Peter Michel, Friederike Migneco, Daniel Müller, Andreas Neider, Muhō Nölke, Harry Oldmeadow, Peter Riedl, Yoshin Franz Ritter, Munish Bernhard Schiekel, Perry Schmidt-Leukel, Kunihiko Terasawa, Gerhard Weißgrab, Karel Werner, Peter Wevelsiep, Werner Zimmermann, Friedhelm Köhler
نوع المادة: eBook.
تصنيفات: PHILOSOPHY / Religious
-
7
المؤلفون: Michael Hölzl, Peter Riedl, Javier González, Rene Mayrhofer, Philippe Bonnet
المصدر: Lecture Notes in Computer Science ISBN: 9783319132563
ISC
Gonzalez, J, Hölzl, M, Riedl, P, Bonnet, P & Mayrhofer, R 2014, ' A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices ', Lecture Notes in Computer Science, vol. 8783, pp. 542-554 . https://doi.org/10.1007/978-3-319-13257-0_35مصطلحات موضوعية: business.industry, computer.internet_protocol, Computer science, Process (computing), Boot Service Discovery Protocol, Software, Embedded system, Component (UML), Architecture, business, Mobile device, computer, Computer hardware, Booting
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::42c6f2bd3ce78728822bc1c4869111a7
https://doi.org/10.1007/978-3-319-13257-0_35 -
8
المؤلفون: Peter Riedl
المصدر: Die Pharmaindustrie ISBN: 9783827429230
Die Pharmaindustrie ISBN: 9783662546550URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2a7959d8bea0aec171f834c09f774666
https://doi.org/10.1007/978-3-8274-2924-7_8 -
9
المؤلفون: Phillip Koller, Matthias Kranz, Marion Koelle, Andreas Möller, Peter Riedl, Rene Mayrhofer
المصدر: MoMM
مصطلحات موضوعية: Cloud computing security, Security service, Computer science, Mobile phone, Mobile computing, Mobile search, Mobile Web, Computer security, computer.software_genre, computer, Security information and event management, Mobile device
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::bdb2272b18a227169eb4b02c6bcb4b48
https://doi.org/10.1145/2536853.2536948 -
10
المؤلفون: Peter Riedl, Rene Mayrhofer
المصدر: ICDCS Workshops
مصطلحات موضوعية: Firmware, Computer science, business.industry, Mobile computing, computer.software_genre, Upload, Fingerprint, Embedded system, Scalability, Use case, Android (operating system), business, computer, Mobile device
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::806bff45c36ff1481efa7adfea43f0b2
https://doi.org/10.1109/icdcsw.2012.26