Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Search Selected
Select All
<<   Previous     Next   >>
Title Main Entry Publication Date
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich / Rosen, Alon. 2006.
Introduction to Cryptography Principles and Applications / Delfs, Hans. 2007.
Formal Correctness of Security Protocols With 62 Figures and 4 Tables / Bella, Giampaolo. 2007.
Information Security and Cryptology - ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers Chee, Seongtaek. 2005
Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Won, Dongho. 2006
Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings Rhee, Min Surp. 2006
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings / Nam, Kil-Hyun. 2007.
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers / Lee, Pil Joong. 2009.
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers / Lee, Donghoon. 2010.
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers / Rhee, Kyung-Hyune. 2011.
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers / Kim, Howon. 2012.
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers / Kwon, Taekyoung. 2013.
Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /   2015.
Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /   2017.
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /   2015.
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers /   2017.
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers / Yung, Moti. 2009.
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers / Bao, Feng. 2011.
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers / Lai, Xuejia. 2011.
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers / Wu, Chuan-Kun. 2012.
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / Kutyłowski, Mirosław. 2013.
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /   2014.
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers /   2014.
Information Security and Cryptology (vol. # 3822) First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Feng, Dengguo. 2005
Information Security and Cryptology (vol. # 4318) Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings Lipmaa, Helger. 2006
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers / Weerasinghe, Dasun. 2010.
Information security and employee behaviour how to reduce risk through employee education, training and awareness / McIlwraith, Angus. c2006.
أمن المعلومات وإدارة مخاطر تقنية المعلومات / أغروال، مانيش، 2018
امن المعلومات و اثره على الثقة في استخدام خدمات الحكومة الالكترونية : دراسة ميدانية على عينة من المؤسسات الحكومية في الاردن / الزيادين، علاء عصام 2012.
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings / Pieprzyk, Josef. 2007.
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / Boyd, Colin. 2009.
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings / Steinfeld, Ron. 2010.
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings / Parampalli, Udaya. 2011.
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / Susilo, Willy. 2012.
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings / Boyd, Colin. 2013.
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /   2014.
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /   2015.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /   2017.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II /   2017.
Information Security and Privacy 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings / Varadharajan, Vijay. 2006.
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Gritzalis, Dimitris. 2012.
Information Security and Privacy (vol. # 3574) 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Boyd, Colin. 2005
Information Security and Privacy (vol. # 4058) 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Batten, Lynn. 2006
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / Youm, Heung Youl. 2009.
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / Chung, Yongwha. 2011.
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers / Jung, Souhwan. 2012.
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers / Lee, Dong Hoon. 2012.
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers /   2014.
Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /   2015.
Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers /   2017.
Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / Lee, Jae Kwang. 2007.
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / Kim, Sehun. 2008.
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers / Chung, Kyo-Il. 2009.
Information Security Applications (vol. # 3325) 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Lim, Chae Hoon. 2005
Information Security Applications (vol. # 3786) 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers Song, Jooseok. 2006
Information Security Awareness : Antecedents and User Satisfaction Perspective Alshboul, Yazan 2017. 2017.
Information security, coding theory and related combinatorics information coding and combinatorics /   2011.
Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /   2015.
Information Security Education for a Global Digital Society 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings /   2017.
Information Security Evaluation A Holistic Approach from a Business Perspective.   2011.
Information Security for Automatic Speaker Identification El-Samie, Fathi E. Abd. 2011.
Information security for management Iyengar, Venugopal. 2010.
Information security for managers / Caelli, William. 1989.
Information security for managers / Caelli, William. 1989.
Information security fundamentals / PELTIER, Thomas R. c2005.
Information security fundamentals / PELTIER, Thomas R. c2005.
Information Security Governance Solms, S.H. 2009.
An information security handbook / Hunter, John M. D., 1940- 2001.
Information security handbook / Caelli, William. 1991.
Information security management : concepts and practice / Raggad, Bel G. 2010.
Information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30-October 1, 1999, Amsterdam, The Netherlands / IFIP TC11 WG11.1/WG11.2 Working Conference on Information Security Management & Small Systems Security 1999 : Amsterdam, Netherlands) c1999.
Information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30-October 1, 1999, Amsterdam, The Netherlands / IFIP TC11 WG11.1/WG11.2 Working Conference on Information Security Management & Small Systems Security 1999 : Amsterdam, Netherlands) c1999.
Information security management handbook /   2005
Information security of highly critical wireless networks /   cop. 2017.
Information Security of Highly Critical Wireless Networks Martellini, Maurizio. 2017.
Information security policies and procedures : a practitioner's reference / PELTIER, Thomas R. c2004.
Information security policy, processes, and practices /   c2008.
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings /   2014.
Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /   2015.
Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings / Bao, Feng. 2009.
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings / Kwak, Jin. 2010.
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings / Bao, Feng. 2011.
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings / Ryan, Mark D. 2012.
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings / Deng, Robert H. 2013.
Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings / Dawson, Ed. 2007.
Information Security Practice and Experience (vol. # 3439) First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Bao, Feng. 2005
Information Security Practice and Experience (vol. # 3903) Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Chen, Kefei. 2006
Information Security Practices Emerging Threats and Perspectives /   2017.
Information security risk analysis PELTIER, Thomas R. c2001.
Fundamentals of network security / Maiwald, Eric. c2004.
Web hacker boot camp / Quakenbush, Gerald 2005.
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers / Aura, Tuomas. 2012.
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers / Laud, Peeter. 2012.
Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings /   2015.
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings /   2014.
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings / Ardagna, Claudio A. 2011.
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings / Cavallaro, Lorenzo. 2013.
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings / Askoxylakis, Ioannis. 2012.
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings / Markowitch, Olivier. 2009.
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings / Samarati, Pierangela. 2010.
<<   Previous     Next   >>