Search Results - "python security"
-
1
Authors: et al.
Source: 2023 Cyber Security Experimentation and Test Workshop. :41-56
-
2
Authors: et al.
Source: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC). :514-520
-
3
Authors:
Source: Wuhan University Journal of Natural Sciences. 24:141-148
-
4
Authors: Dennis Byrne
Resource Type: eBook.
Categories: COMPUTERS / Languages / Python, COMPUTERS / Software Development & Engineering / General, COMPUTERS / Security / General
-
5
Authors:
Contributors:
Subject Terms: Computer Science, Studienbereich Informatik, Ingenieurwissenschaften
Relation: https://av.tib.eu/media/60858
Availability: https://av.tib.eu/media/60858
-
6
Authors:
Contributors:
Subject Terms: Computer Science, Studienbereich Informatik, Ingenieurwissenschaften
Relation: https://av.tib.eu/media/58807
Availability: https://av.tib.eu/media/58807
-
7
Authors:
Contributors:
Subject Terms: EP 2015, EuroPython Conference, EuroPython 2015, Computer Science, Studienbereich Informatik, Ingenieurwissenschaften
Relation: https://av.tib.eu/media/20140
Availability: https://av.tib.eu/media/20140
-
8
-
9
-
10
-
11
Authors: Izosimov, Pavel
Subject Terms: Alpha Beta Network, code protection, cloud platform, secure code sharing, code security, python obfuscator, secure file transfer, code obfuscation, intellectual property protection, software licensing, secure distribution, python development, python code encryption, license management, python security, source code protection
-
12
Source: Indianapolis Business Journal. 5/27/96, Vol. 17 Issue 10, p19B. 1/3p. 1 Black and White Photograph.
-
13
Authors: et al.
Source: Applied Sciences (2076-3417); Jan2026, Vol. 16 Issue 1, p517, 17p
-
14
Authors: et al.
Source: Communications of the ACM; Feb2025, Vol. 68 Issue 2, p96-105, 10p
Subject Terms: HUMAN-artificial intelligence interaction, COMPUTER programming, COMPUTER security vulnerabilities, PROGRAMMING languages
Company/Entity: GITHUB Inc.
-
15
Authors:
Source: International Scientific Journal of Engineering and Management. :1-9
-
16
Authors: et al.
Source: Journal of Cybersecurity & Privacy; Dec2025, Vol. 5 Issue 4, p110, 29p
-
17
Authors:
Source: Educational Science Literature; Dec2025, Vol. 2 Issue 12, p37-45, 9p
-
18
Authors:
Source: ACM Computing Surveys; Dec2025, Vol. 57 Issue 12, p1-32, 32p
-
19
Authors:
Source: Empirical Software Engineering; Oct2025, Vol. 30 Issue 5, p1-69, 69p
-
20
Authors: et al.
Source: Electronics (2079-9292); Sep2025, Vol. 14 Issue 17, p3436, 19p
Subject Terms: DEEP learning, COMPUTER software security, PYTHON programming language
Nájsť tento článok vo Web of Science
Full Text Finder