Welcome
user_choices_background_image
Welcome
login container bottom
Search Library Catalog
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 20 of 1065
2 3 4 5 6 7 8 9 10 Next >>
1. Title: New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa.
IFIP International Federation for Information Processing,
Author: Venter, Hein.
Publication: International Federation for Information Processing, Boston, MA : 2007.
2. Title: Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA / edited by Lynn Futcher, Ronald Dodg
IFIP — International Federation for Information Processing,
Author: Futcher, Lynn.
Publication: International Federation for Information Processing, Boston, MA : 2007.
3. Title: Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30– August 2, 2007, New Brunswick, Canada / edited by Sandro Etalle, Stephen Marsh.
IFIP International Federation for Information Processing,
Author: Etalle, Sandro.
Publication: International Federation for Information Processing, Boston, MA : 2007.
4. Title: Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems / edited by Jordi Nin, Javier Herranz.
Advanced Information and Knowledge Processing,
Advanced information and knowledge processing,
Author: Nin, Jordi.
Publication: Springer London, London : 2010.
5. Title: ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference / edited by Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider.
Author: Pohlmann, Norbert.
Publication: Vieweg+Teubner, Wiesbaden : 2009.
6. Title: Future of Trust in Computing Proceedings of the First International Conference Future of Trust in Computing 2008 / edited by David Gawrock, Helmut Reimer, Ahmad-Reza Sadeghi, Claire Vishik.
Author: Gawrock, David.
Publication: Vieweg+Teubner, Wiesbaden : 2009.
7. Title: ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference / edited by Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider.
Author: Pohlmann, Norbert.
Publication: Vieweg+Teubner, Wiesbaden : 2010.
8. Title: ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference / edited by Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider.
Author: Pohlmann, Norbert.
Publication: Vieweg+Teubner, Wiesbaden : 2011.
9. Title: Counterterrorism and Open Source Intelligence edited by Uffe Kock Wiil.
Lecture Notes in Social Networks,
Lecture Notes in Social Networks,
Author: Wiil, Uffe Kock.
Publication: Springer Vienna, Vienna : 2011.
10. Title: Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings / edited by Javier Lopez, Chris J. Mitchell.
Lecture Notes in Computer Science,
Lecture notes in computer science,
Publication: Springer International Publishing : Imprint: Springer, Cham : 2015.
Edition: 1st ed. 2015.
11. Title: International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II / edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Publication: Springer International Publishing : Imprint: Springer, Cham : 2015.
Edition: 1st ed. 2015.
12. Title: International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I / edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Publication: Springer International Publishing : Imprint: Springer, Cham : 2015.
Edition: 1st ed. 2015.
13. Title: Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / edited by Stefan Mangard, Patrick Schaumont.
Lecture Notes in Computer Science,
Lecture notes in computer science,
Publication: Springer International Publishing : Imprint: Springer, Cham : 2015.
Edition: 1st ed. 2015.
14. Title: ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference / edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider.
Publication: Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, Wiesbaden : 2015.
Edition: 1st ed. 2015.
15. Title: Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers / edited by Yuyu Yuan, Xu Wu, Yueming Lu.
Communications in Computer and Information Science,
Communications in Computer and Information Science,
Publication: Springer Berlin Heidelberg : Imprint: Springer, Berlin, Heidelberg : 2014.
16. Title: ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference / edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider.
Publication: Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, Wiesbaden : 2014.
17. Title: Critical Information Infrastructures Resilience and Protection / by Maitland Hyslop.
Author: Hyslop, Maitland.
Publication: Springer Science+Business Media, LLC, Boston, MA : 2007.
18. Title: ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference / edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider.
Author: Reimer, Helmut.
Publication: Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, Wiesbaden : 2013.
19. Title: Certified Ethical Hacker (CEH) Foundation Guide by Sagar Ajay Rahalkar.
Author: Rahalkar, Sagar Ajay.
Publication: Apress : Imprint: Apress, Berkeley, CA : 2016.
20. Title: NTP Security A Quick-Start Guide / by Allan Liska.
Author: Liska, Allan.
Publication: Apress : Imprint: Apress, Berkeley, CA : 2016.
 
 
Results 1 - 20 of 1065
2 3 4 5 6 7 8 9 10 Next >>
Duplicate Items
Add to My List

Print
Sorts and Limits