Systems and Data Security.
概要
作品: | 441 作品在 437 项出版品 437 种语言 |
---|
书目信息
Proceedings of the International Conference on IT Convergence and Security 2011[electronic resource] /
by:
(书目-语言数据,印刷品)
RFID: Security and privacy[electronic resource] :7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(书目-语言数据,印刷品)
Distributed computing and networking[electronic resource] :13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Achieving systems safety[electronic resource] :proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(书目-语言数据,印刷品)
Collaborative financial infrastructure protection[electronic resource] :tools, abstractions, and middleware /
by:
(书目-语言数据,印刷品)
Information security applications[electronic resource] :12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(书目-语言数据,印刷品)
Cryptography and security[electronic resource] :from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(书目-语言数据,印刷品)
Selected areas in cryptography[electronic resource] :18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(书目-语言数据,印刷品)
Theory of cryptography[electronic resource] :9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Critical infrastructure protection[electronic resource] :information infrastructure models, analysis, and defense /
by:
(书目-语言数据,印刷品)
A survey of data leakage detection and prevention solutions[electronic resource] /
by:
(书目-语言数据,印刷品)
Information security practice and experience[electronic resource] :8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Security and trust management[electronic resource] :7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(书目-语言数据,印刷品)
Wired/Wireless internet communication[electronic resource] :10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Decision and game theory for security[electronic resource] :third international conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Network and system security[electronic resource] :6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Information security applications[electronic resource] :13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(书目-语言数据,印刷品)
Ambient intelligence[electronic resource] :European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008 : proceedings /
by:
(书目-语言数据,印刷品)
Information and communications security[electronic resource] :10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(书目-语言数据,印刷品)
Information hiding[electronic resource] :10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(书目-语言数据,印刷品)
Post-quantum cryptography[electronic resource] :second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(书目-语言数据,印刷品)
Provable security[electronic resource] :second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(书目-语言数据,印刷品)
Research in cryptology[electronic resource] :second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(书目-语言数据,印刷品)
Network computing and information security[electronic resource] :second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
E-Business and telecommunications[electronic resource] :International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011 : revised selected papers /
by:
(书目-语言数据,印刷品)
Cyberspace safety and security[electronic resource] :4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Information systems security[electronic resource] :8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Programming languages and systems[electronic resource] :10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Trusted systems[electronic resource] :4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Cryptology and network security[electronic resource] :11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(书目-语言数据,印刷品)
Cyberpatterns[electronic resource] :unifying design patterns with security and attack patterns /
by:
(书目-语言数据,印刷品)
Privacy technologies and policy[electronic resource] :second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Secure data management[electronic resource] :10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(书目-语言数据,印刷品)
Engineering secure future internet services and systems[electronic resource] :current research /
by:
(书目-语言数据,印刷品)
Selected areas in cryptography - SAC 2013[electronic resource] :20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Visual cryptography for image processing and security[electronic resource] :theory, methods, and applications /
by:
(书目-语言数据,印刷品)
Cryptography and security systems[electronic resource] :Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Security in computing and communications[electronic resource] :Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Foundations of security analysis and design VII[electronic resource] :FOSAD 2012/2013 tutorial lectures /
by:
(书目-语言数据,印刷品)
Smart grid security[electronic resource] :Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014 : revised selected papers /
by:
(书目-语言数据,印刷品)
Security and cryptography for networks[electronic resource] :9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Web technologies and applications[electronic resource] :APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Service-oriented and cloud computing[electronic resource] :Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Cyber-development, cyber-democracy and cyber-defense[electronic resource] :challenges, opportunities and implications for theory, policy and practice /
by:
(书目-语言数据,印刷品)
Pervasive wireless environments[electronic resource] :detecting and localizing user spoofing /
by:
(书目-语言数据,印刷品)
Trust Management VIII[electronic resource] :8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2013, Beijing, China, November 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Applied cryptography and network security[electronic resource] :12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Privacy enhancing technologies[electronic resource] :14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings /
by:
(书目-语言数据,印刷品)
Trust and trustworthy computing[electronic resource] :7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(书目-语言数据,印刷品)
Bio-inspiring cyber security and cloud services[electronic resource] :trends and innovations /
by:
(书目-语言数据,印刷品)
Continued rise of the cloud[electronic resource] :advances and trends in cloud computing /
by:
(书目-语言数据,印刷品)
Information security and privacy[electronic resource] :19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Fast software encryption[electronic resource] :20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part I /
by:
(书目-语言数据,印刷品)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part II /
by:
(书目-语言数据,印刷品)
A mathematical approach to research problems of science and technology[electronic resource] :theoretical basis and developments in mathematical modeling /
by:
(书目-语言数据,印刷品)
Attribute-based credentials for trust[electronic resource] :identity in the information society /
by:
(书目-语言数据,印刷品)
Game theoretic analysis of congestion, safety and security[electronic resource] :traffic and transportation theory /
by:
(书目-语言数据,印刷品)
Game theoretic analysis of congestion, safety and security[electronic resource] :networks, air traffic and emergency departments /
by:
(书目-语言数据,印刷品)
Information security applications[electronic resource] :15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : revised selected papers /
by:
(书目-语言数据,印刷品)
Understanding network hacks[electronic resource] :attack and defense with Python /
by:
(书目-语言数据,印刷品)
Real-time security extensions for EPCglobal networks[electronic resource] :case study for the pharmaceutical industry /
by:
(书目-语言数据,印刷品)
Signal processing approaches to secure physical layer communications in multi-antenna wireless systems[electronic resource] /
by:
(书目-语言数据,印刷品)
Computational intelligence, cyber security and computational models[electronic resource] :proceedings of ICC3, 2013 /
by:
(书目-语言数据,印刷品)
Cyberspace and international relations[electronic resource] :theory, prospects and challenges /
by:
(书目-语言数据,印刷品)
Ad hoc networks[electronic resource] :5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Information theoretic security[electronic resource] :7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(书目-语言数据,印刷品)
Pairing-based cryptography - Pairing 2013[electronic resource] :6th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Distributed computing and networking[electronic resource] :15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Privacy technologies and policy[electronic resource] :first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012 : revised selected papers /
by:
(书目-语言数据,印刷品)
Future business software[electronic resource] :current trends in business software development /
by:
(书目-语言数据,印刷品)
Passive and active measurement[electronic resource] :15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Theory of cryptography[electronic resource] :11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : proceedings /
by:
(书目-语言数据,印刷品)
Network hardening[electronic resource] :an automated approach to improving network security /
by:
(书目-语言数据,印刷品)
Trustworthy global computing[electronic resource] :8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Information security applications[electronic resource] :14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers /
by:
(书目-语言数据,印刷品)
Transactions on data hiding and multimedia security IX[electronic resource] :Special Issue on Visual Cryptography /
by:
(书目-语言数据,印刷品)
Building the infrastructure for cloud security[electronic resource] :a solutions view /
by:
(书目-语言数据,印刷品)
Self- and co-regulation in cybercrime, cybersecurity and national security[electronic resource] /
by:
(书目-电子资源)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(书目-语言数据,印刷品)
Information security and privacy[electronic resource] :20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part I /
by:
(书目-语言数据,印刷品)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part II /
by:
(书目-语言数据,印刷品)
Encrypted email[electronic resource] :the history and technology of message privacy /
by:
(书目-语言数据,印刷品)
Security in computing and communications[electronic resource] :third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Interactive theorem proving[electronic resource] :6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
E-Voting and identity[electronic resource] :5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Trust and trustworthy computing[electronic resource] :8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Internet and distributed computing systems[electronic resource] :8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Information security[electronic resource] :18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Fast software encryption[electronic resource] :22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Modeling and evaluating denial of service attacks for wireless and mobile applications[electronic resource] /
by:
(书目-语言数据,印刷品)
Visual cryptography for image processing and security[electronic resource] :theory, methods, and applications /
by:
(书目-语言数据,印刷品)
Ad hoc networks[electronic resource] :7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(书目-语言数据,印刷品)
ISSE 2015[electronic resource] :highlights of the Information Security Solutions Europe 2015 Conference /
by:
(书目-语言数据,印刷品)
Service oriented and cloud computing[electronic resource] :4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Radio frequency identification[electronic resource] :11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Security and trust management[electronic resource] :11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Decision and game theory for security[electronic resource] :6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Network and system security[electronic resource] :9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Mobile, secure, and programmable networking[electronic resource] :first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(书目-语言数据,印刷品)
Provable security[electronic resource] :9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Security protocols XXIII[electronic resource] :23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Research in attacks,intrusions, and defenses[electronic resource] :18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Risk assessment and risk-driven testing[electronic resource] :third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Secure IT systems[electronic resource] :20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cryptology and network security[electronic resource] :14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(书目-语言数据,印刷品)
Multimedia communications, services and security[electronic resource] :8th International Conference, MCSS 2015, Krakow, Poland, November 24, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Advances in computer science and ubiquitous computing[electronic resource] :CSA & CUTE /
by:
(书目-语言数据,印刷品)
Information systems security[electronic resource] :11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Security standardisation research[electronic resource] :second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cryptography and coding[electronic resource] :15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Trusted systems[electronic resource] :6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(书目-语言数据,印刷品)
Technology and practice of passwords[electronic resource] :9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Passive and active measurement[electronic resource] :17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016 : proceedings /
by:
(书目-语言数据,印刷品)
Privacy technologies and policy[electronic resource] :third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Intelligence and security informatics[electronic resource] :11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings /
by:
(书目-语言数据,印刷品)
Digital-forensics and watermarking[electronic resource] :14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
The new codebreakers[electronic resource] :essays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(书目-语言数据,印刷品)
Enforcing privacy[electronic resource] :regulatory, legal and technological approaches /
by:
(书目-语言数据,印刷品)
Privacy-enhancing aggregation techniques for smart grid communications[electronic resource] /
by:
(书目-语言数据,印刷品)
Cloud computing[electronic resource] :6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Computer networks[electronic resource] :23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016 : proceedings /
by:
(书目-语言数据,印刷品)
Combatting cybercrime and cyberterrorism[electronic resource] :challenges, trends and priorities /
by:
(书目-语言数据,印刷品)
Physical and data-link security techniques for future communication systems[electronic resource] /
by:
(书目-语言数据,印刷品)
Trends and applications in software engineering[electronic resource] :proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 /
by:
(书目-语言数据,印刷品)
Theory of cryptography[electronic resource] :13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(书目-语言数据,印刷品)
Transactions on large-scale data- and knowledge-centered systems XXIII[electronic resource] :selected papers from FDSE 2014 /
by:
(书目-语言数据,印刷品)
Computational intelligence, cyber security and computational models[electronic resource] :proceedings of ICC3 2015 /
by:
(书目-语言数据,印刷品)
SAP project management pitfalls[electronic resource] :how to avoid the most common pitfalls of an SAP solution /
by:
(书目-语言数据,印刷品)
Cyber security[electronic resource] :second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Advances in parallel and distributed computing and ubiquitous services[electronic resource] :UCAWSN & PDCAT 2015 /
by:
(书目-语言数据,印刷品)
Trustworthy global computing[electronic resource] :10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Transactions on computational science XXVI[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(书目-语言数据,印刷品)
Cybersecurity in the European Union[electronic resource] :resilience and adaptability in governance policy /
by:
(书目-语言数据,印刷品)
Cybersecurity investments[electronic resource] :decision support under economic aspects /
by:
(书目-语言数据,印刷品)
Post-quantum cryptography[electronic resource] :7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(书目-语言数据,印刷品)
Graphical models for security[electronic resource] :second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Industrial espionage and technical surveillance counter measurers[electronic resource] /
by:
(书目-语言数据,印刷品)
Exploring the security landscape[electronic resource] :non-traditional security challenges /
by:
(书目-语言数据,印刷品)
The accidental SysAdmin handbook[electronic resource] :a primer for early level IT professionals /
by:
(书目-语言数据,印刷品)
Security-aware device-to-device communications underlaying cellular networks[electronic resource] /
by:
(书目-电子资源)
Security and resiliency analytics for smart grids[electronic resource] :static and dynamic approaches /
by:
(书目-电子资源)
Watermarking security[electronic resource] :fundamentals, secure designs and attacks /
by:
(书目-电子资源)
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
by:
(书目-电子资源)
Elements of cloud computing security[electronic resource] :a survey of key practicalities /
by:
(书目-电子资源)
Transactions on computational science XXVIII[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(书目-电子资源)
Preserving privacy against side-channel leaks[electronic resource] :from data publishing to web applications /
by:
(书目-电子资源)
Mobile device management[electronic resource] :mobility evaluation in small and medium-sized enterprises /
by:
(书目-电子资源)
Foundations of security analysis and design VIII[electronic resource] :FOSAD 2014/2015/2016 tutorial lectures /
by:
(书目-电子资源)
Building trust in information[electronic resource] :perspectives on the frontiers of provenance /
by:
(书目-电子资源)
Cybersecurity for hospitals and healthcare facilities[electronic resource] :a guide to detection and prevention /
by:
(书目-电子资源)
Social network analysis in predictive policing[electronic resource] :concepts, models and methods /
by:
(书目-电子资源)
Elements of cloud storage security[electronic resource] :concepts, designs and optimized practices /
by:
(书目-电子资源)
Oracle Application Express administration[electronic resource] :for DBAs and Developers /
by:
(书目-电子资源)
The second economy[electronic resource] :the race for trust, treasure and time in the cybersecurity war /
by:
(书目-电子资源)
Wireless sensor networks[electronic resource] :security, coverage, and localization /
by:
(书目-语言数据,印刷品)
Android application security[electronic resource] :a semantics and context-aware approach /
by:
(书目-语言数据,印刷品)
Information Theoretic Security[electronic resource] :9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016 : revised selected papers /
by:
(书目-语言数据,印刷品)
Information systems security[electronic resource] :12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(书目-语言数据,印刷品)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(书目-语言数据,印刷品)
Advances in visual computing[electronic resource] :12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016 : proceedings.Part II /
by:
(书目-语言数据,印刷品)
Advances in visual computing[electronic resource] :12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016 : proceedings.Part I /
by:
(书目-语言数据,印刷品)
主题