Computer networks - Handbooks, manuals, etc. - Security measures
Overview
Works: | 118 works in 108 publications in 108 languages |
---|
Titles
GFI network security and PCI compliance power tools[electronic resource] /
by:
(Language materials, printed)
Security informatics and terrorism[electronic resource] :patrolling the Web : social and technical problems of detecting and controlling terrorists' use of the World Wide Web /
by:
(Language materials, printed)
RFID: Security and privacy[electronic resource] :7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Theory of security and applications[electronic resource] :Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Language materials, printed)
Achieving systems safety[electronic resource] :proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(Language materials, printed)
Security and intelligent information systems[electronic resource] :International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Language materials, printed)
Information security applications[electronic resource] :12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Language materials, printed)
Data privacy management and autonomous spontaneus security[electronic resource] :6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Security and trust management[electronic resource] :7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Trust management VI[electronic resource] :6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Language materials, printed)
Intelligence and security informatics[electronic resource] :Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012 : proceedings /
by:
(Language materials, printed)
Handbook of research on information security and assurance[electronic resource] /
by:
(Language materials, printed)
Use of risk analysis in computer-aided persuasion[electronic resource] /
by:
(Language materials, printed)
Computer applications for security, control and system engineering[electronic resource] :International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Language materials, printed)
Decision and game theory for security[electronic resource] :third international conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Information security applications[electronic resource] :13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Language materials, printed)
Digital security[electronic resource] :cyber terror and cyber security /
by:
(Language materials, printed)
Network computing and information security[electronic resource] :second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Language materials, printed)
ISSE 2012 securing electronic business processes[electronic resource] :highlights of the Information Security Solutions Europe 2012 Conference /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2012[electronic resource] :13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Information systems security[electronic resource] :8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Language materials, printed)
Trusted systems[electronic resource] :4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Language materials, printed)
Critical infrastructure protection VI [electronic resource] :6th IFIP WG 11.10 international conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Language materials, printed)
Handbook on securing cyber-physical critical infrastructure[electronic resource] :foundation and challenges /
by:
(Language materials, printed)
Cyber warfare[electronic resource] :techniques, tactics and tools for security practitioners /
by:
(Language materials, printed)
Best practices in computer network defense [electronic resource]:incident detection and response /
by:
(Language materials, printed)
Cyber warfare[electronic resource] :techniques, tactics and tools for security practitioners /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014 : proceedings /
by:
(Language materials, printed)
Security in computing and communications[electronic resource] :Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : proceedings /
by:
(Language materials, printed)
Foundations of security analysis and design VII[electronic resource] :FOSAD 2012/2013 tutorial lectures /
by:
(Language materials, printed)
Security and cryptography for networks[electronic resource] :9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Language materials, printed)
Trust Management VIII[electronic resource] :8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(Language materials, printed)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2013, Beijing, China, November 2013 : revised selected papers /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Language materials, printed)
Monitoring and securing virtualized networks and services[electronic resource] :8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014 : proceedings /
by:
(Language materials, printed)
Emerging ICT for bridging the future[electronic resource] :proceedings of the 49th Annual Convention of the Computer Society of India (CSI).Volume 1 /
by:
(Language materials, printed)
Emerging ICT for bridging the future[electronic resource] :proceedings of the 49th Annual Convention of the Computer Society of India CSI.Volume 2 /
by:
(Language materials, printed)
Real-time security extensions for EPCglobal networks[electronic resource] :case study for the pharmaceutical industry /
by:
(Language materials, printed)
ICT and critical infrastructure[electronic resource] :proceedings of the 48th Annual Convention of Computer Society of India.Volume II /
by:
(Language materials, printed)
ICT and critical infrastructure[electronic resource] :proceedings of the 48th Annual Convention of Computer Society of India.Volume I /
by:
(Language materials, printed)
Computational intelligence, cyber security and computational models[electronic resource] :proceedings of ICC3, 2013 /
by:
(Language materials, printed)
Recent trends in computer networks and distributed systems security[electronic resource] :second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Language materials, printed)
Trustworthy global computing[electronic resource] :8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers /
by:
(Language materials, printed)
Data privacy management and autonomous spontaneous security[electronic resource] :8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Information and communication technology[electronic resource] :second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 : proceedings /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
International Joint Conference[electronic resource] :CISIS'15 and ICEUTE'15 /
by:
(Electronic resources)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(Language materials, printed)
Information security and privacy[electronic resource] :20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Intelligent mechanisms for network configuration and security[electronic resource] :9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015 : proceedings /
by:
(Language materials, printed)
Data and applications security and privacy XXIX[electronic resource] :29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
by:
(Language materials, printed)
Human aspects of information security, privacy, and trust[electronic resource] :third International Conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015 : proceedings /
by:
(Language materials, printed)
Security in computing and communications[electronic resource] :third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
by:
(Language materials, printed)
Information and communications security[electronic resource] :16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Progress in Cryptology - LATINCRYPT 2015[electronic resource] :4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Critical infrastructure protection IX[electronic resource] :9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Language materials, printed)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Information and communication technology[electronic resource] :third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, held as part of WCC 2015, Daejeon, Korea, October 4-7, 2015 : proceedings /
by:
(Language materials, printed)
Computer information systems and industrial management[electronic resource] :14th IFIP TC 8 International Conference, CISIM 2015, Warsaw, Poland, September 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Security and trust management[electronic resource] :11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks[electronic resource] :10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.Part II /
by:
(Language materials, printed)
Information systems security and privacy[electronic resource] :first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Innovative security solutions for information technology and communications[electronic resource] :8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Language materials, printed)
Trusted systems[electronic resource] :6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Language materials, printed)
Security and privacy in communication networks[electronic resource] :11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Trusted systems[electronic resource] :7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(Language materials, printed)
Critical information infrastructures security[electronic resource] :9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers /
by:
(Language materials, printed)
Risks and security of internet and systems[electronic resource] :10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part II /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Language materials, printed)
Transactions on large-scale data- and knowledge-centered systems XXIII[electronic resource] :selected papers from FDSE 2014 /
by:
(Language materials, printed)
Trustworthy global computing[electronic resource] :10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 : revised selected papers /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2016[electronic resource] :the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Language materials, printed)
Graphical models for security[electronic resource] :second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
(Language materials, printed)
Human aspects of information security, privacy, and trust[electronic resource] :4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security[electronic resource] :14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Management and security in the age of hyperconnectivity[electronic resource] :10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part I /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systems[electronic resource] :first Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Trust management X[electronic resource] :10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part II /
by:
(Electronic resources)
Foundations of security analysis and design VIII[electronic resource] :FOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Security and cryptography for networks[electronic resource] :10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing[electronic resource] :9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Security in Computing and Communications[electronic resource] :4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Electronic resources)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016 : proceedings /
by:
(Electronic resources)
Computer information systems and industrial management[electronic resource] :15th IFIP TC8 International Conference, CISIM 2016, Vilnius, Lithuania, September 14-16, 2016 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part I /
by:
(Electronic resources)
Graphical models for security[electronic resource] :third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016 : revised selected papers /
by:
(Electronic resources)
Security and trust management[electronic resource] :12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Innovative security solutions for information technology and communications[electronic resource] :9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security[electronic resource] :15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection X[electronic resource] :10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016 : revised selected papers /
by:
(Language materials, printed)
Digital connectivity[electronic resource] :social impact : 51st Annual Convention of the Computer Society of India, CSI 2016, Coimbatore, India, December 8-9, 2016 : proceedings /
by:
(Language materials, printed)
Security, privacy and anonymity in computation, communication and storage[electronic resource] :SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Security, privacy, and anonymity in computation, communication, and storage[electronic resource] :9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Practical deployment of Cisco Identity Services Engine (ISE)[electronic resource] :real-world examples of AAA deployments /
by:
(Language materials, printed)
Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures[electronic resource] /
by:
(Electronic resources)
Subjects