Systems and Data Security.
Overview
Works: | 441 works in 437 publications in 437 languages |
---|
Titles
Proceedings of the International Conference on IT Convergence and Security 2011[electronic resource] /
by:
(Language materials, printed)
RFID: Security and privacy[electronic resource] :7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Distributed computing and networking[electronic resource] :13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012 : proceedings /
by:
(Language materials, printed)
Achieving systems safety[electronic resource] :proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(Language materials, printed)
Collaborative financial infrastructure protection[electronic resource] :tools, abstractions, and middleware /
by:
(Language materials, printed)
Security and intelligent information systems[electronic resource] :International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Language materials, printed)
Data security and security data[electronic resource] :27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. revised selected papers /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Language materials, printed)
Information security applications[electronic resource] :12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Language materials, printed)
Topics in Cryptology - CT-RSA 2012[electronic resource] :the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Language materials, printed)
Cryptography and security[electronic resource] :from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Language materials, printed)
Selected areas in cryptography[electronic resource] :18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Language materials, printed)
Transactions on Data Hiding and Multimedia Security VII[electronic resource] /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Language materials, printed)
Critical infrastructure protection[electronic resource] :information infrastructure models, analysis, and defense /
by:
(Language materials, printed)
The economics of financial and medical identity theft[electronic resource] /
by:
(Language materials, printed)
A survey of data leakage detection and prevention solutions[electronic resource] /
by:
(Language materials, printed)
Mobile phone security and forensics[electronic resource] :a practical approach /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2012[electronic resource] :31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Advanced computing, networking and security[electronic resource] :International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011 : revised selected papers /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Language materials, printed)
Security and trust management[electronic resource] :7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Emerging trends and applications in information communication technologies[electronic resource] :second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012 : proceedings /
by:
(Language materials, printed)
Public key infrastructures, services and applications[electronic resource] :8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /
by:
(Language materials, printed)
Public key cryptography - PKC 2012[electronic resource] :15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Wired/Wireless internet communication[electronic resource] :10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012 : proceedings /
by:
(Language materials, printed)
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Language materials, printed)
Decision and game theory for security[electronic resource] :third international conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Modeling decisions for artificial intelligence[electronic resource] :9th international conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Advances in Cryptology - ASIACRYPT 2012[electronic resource] :18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Language materials, printed)
Information security applications[electronic resource] :13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Language materials, printed)
Ambient intelligence[electronic resource] :European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008 : proceedings /
by:
(Language materials, printed)
Information and communications security[electronic resource] :10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Language materials, printed)
Information hiding[electronic resource] :10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Language materials, printed)
Information networking[electronic resource] :towards ubiquitous networking and services : International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007 : revised selected papers /
by:
(Language materials, printed)
On the move to meaningful internet systems: OTM 2008[electronic resource] :OTM 2008 Confederated international conferences CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 : proceedings.Part II /
by:
(Language materials, printed)
On the move to meaningful internet systems: OTM 2008[electronic resource] :OTM 2008 Confederated international conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 : proceedings.Part I /
by:
(Language materials, printed)
Post-quantum cryptography[electronic resource] :second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Language materials, printed)
Provable security[electronic resource] :second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Language materials, printed)
Research in cryptology[electronic resource] :second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Language materials, printed)
Advances in digital forensics VIII[electronic resource] :8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012 : revised selected papers /
by:
(Language materials, printed)
Network computing and information security[electronic resource] :second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Language materials, printed)
Digital forensics and cyber crime[electronic resource] :third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
E-Business and telecommunications[electronic resource] :International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011 : revised selected papers /
by:
(Language materials, printed)
Cyberspace safety and security[electronic resource] :4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2012[electronic resource] :13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Information systems security[electronic resource] :8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Language materials, printed)
Programming languages and systems[electronic resource] :10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012 : proceedings /
by:
(Language materials, printed)
Trusted systems[electronic resource] :4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Language materials, printed)
On the move to meaningful internet systems: OTM 2012[electronic resource] :confederated international conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012 : proceedings.Part I /
by:
(Language materials, printed)
On the move to meaningful internet systems: OTM 2012[electronic resource] :confederated international conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012 : proceedings.Part II /
by:
(Language materials, printed)
Critical infrastructure protection VI [electronic resource] :6th IFIP WG 11.10 international conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Language materials, printed)
Cyberpatterns[electronic resource] :unifying design patterns with security and attack patterns /
by:
(Language materials, printed)
Virtualization techniques for mobile systems[electronic resource] /
by:
(Language materials, printed)
Querying over encrypted data in smart grids[electronic resource] /
by:
(Language materials, printed)
Privacy and identity management for emerging services and technologies[electronic resource] :8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013 : revised selected papers /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - AFRICACRYPT 2014[electronic resource] :7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings /
by:
(Language materials, printed)
Privacy technologies and policy[electronic resource] :second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014 : proceedings /
by:
(Language materials, printed)
Secure data management[electronic resource] :10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(Language materials, printed)
Engineering secure future internet services and systems[electronic resource] :current research /
by:
(Language materials, printed)
Selected areas in cryptography - SAC 2013[electronic resource] :20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(Language materials, printed)
e-Infrastructure and e-Services for developing countries[electronic resource] :5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013 : revised selected papers /
by:
(Language materials, printed)
Visual cryptography for image processing and security[electronic resource] :theory, methods, and applications /
by:
(Language materials, printed)
Cryptography and security systems[electronic resource] :Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(Language materials, printed)
Security in computing and communications[electronic resource] :Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : proceedings /
by:
(Language materials, printed)
Trust, privacy, and security in digital business[electronic resource] :11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 : proceedings /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Language materials, printed)
Foundations of security analysis and design VII[electronic resource] :FOSAD 2012/2013 tutorial lectures /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014 : revised selected papers /
by:
(Language materials, printed)
Smart grid security[electronic resource] :Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014 : revised selected papers /
by:
(Language materials, printed)
Computer safety, reliability, and security[electronic resource] :SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014 : proceedings /
by:
(Language materials, printed)
Security and cryptography for networks[electronic resource] :9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Language materials, printed)
Web technologies and applications[electronic resource] :APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014 : proceedings /
by:
(Language materials, printed)
Computer security - ESORICS 2014[electronic resource] :19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part I /
by:
(Language materials, printed)
Computer security - ESORICS 2014[electronic resource] :19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part II /
by:
(Language materials, printed)
Research in attacks, intrusions, and defenses[electronic resource] :17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014 : proceedings /
by:
(Language materials, printed)
Service-oriented and cloud computing[electronic resource] :Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014 : proceedings /
by:
(Language materials, printed)
Communications and multimedia security[electronic resource] :15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings /
by:
(Language materials, printed)
Cyber-development, cyber-democracy and cyber-defense[electronic resource] :challenges, opportunities and implications for theory, policy and practice /
by:
(Language materials, printed)
Cyberterrorism[electronic resource] :understanding, assessment, and response /
by:
(Language materials, printed)
Pervasive wireless environments[electronic resource] :detecting and localizing user spoofing /
by:
(Language materials, printed)
Advanced information systems engineering workshops[electronic resource] :CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014 : proceedings /
by:
(Language materials, printed)
Trust Management VIII[electronic resource] :8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(Language materials, printed)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2013, Beijing, China, November 2013 : revised selected papers /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Language materials, printed)
Human aspects of information security, privacy, and trust[electronic resource] :second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications[electronic resource] :12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013 : revised selected papers /
by:
(Language materials, printed)
Privacy enhancing technologies[electronic resource] :14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings /
by:
(Language materials, printed)
Detection of intrusions and malware, and vulnerability assessment[electronic resource] :11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Language materials, printed)
Interactive theorem proving[electronic resource] :5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014 : proceedings /
by:
(Language materials, printed)
Information security theory and practice[electronic resource] :securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014 : proceedings /
by:
(Language materials, printed)
Monitoring and securing virtualized networks and services[electronic resource] :8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014 : proceedings /
by:
(Language materials, printed)
Data and applications security and privacy XXVIII[electronic resource] :28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014 : proceedings /
by:
(Language materials, printed)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(Language materials, printed)
Bio-inspiring cyber security and cloud services[electronic resource] :trends and innovations /
by:
(Language materials, printed)
Continued rise of the cloud[electronic resource] :advances and trends in cloud computing /
by:
(Language materials, printed)
Socio-technical design of ubiquitous computing systems[electronic resource] /
by:
(Language materials, printed)
ICT and society[electronic resource] :11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014 : proceedings /
by:
(Language materials, printed)
Risk assessment and risk-driven testing[electronic resource] :first International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013 : revised selected papers /
by:
(Language materials, printed)
Information security and privacy[electronic resource] :19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(Language materials, printed)
Digital-forensics and watermarking[electronic resource] :12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013 : revised selected papers /
by:
(Language materials, printed)
Fast software encryption[electronic resource] :20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part II /
by:
(Language materials, printed)
A mathematical approach to research problems of science and technology[electronic resource] :theoretical basis and developments in mathematical modeling /
by:
(Language materials, printed)
Attribute-based credentials for trust[electronic resource] :identity in the information society /
by:
(Language materials, printed)
Game theoretic analysis of congestion, safety and security[electronic resource] :traffic and transportation theory /
by:
(Language materials, printed)
Game theoretic analysis of congestion, safety and security[electronic resource] :networks, air traffic and emergency departments /
by:
(Language materials, printed)
Detecting peripheral-based attacks on the host memory[electronic resource] /
by:
(Language materials, printed)
Distributed computing and internet technology[electronic resource] :11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015 : proceedings /
by:
(Language materials, printed)
Information security applications[electronic resource] :15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : revised selected papers /
by:
(Language materials, printed)
Understanding network hacks[electronic resource] :attack and defense with Python /
by:
(Language materials, printed)
Real-time security extensions for EPCglobal networks[electronic resource] :case study for the pharmaceutical industry /
by:
(Language materials, printed)
Secure smart embedded devices, platforms and applications[electronic resource] /
by:
(Language materials, printed)
Security, privacy and trust in cloud systems[electronic resource] /
by:
(Language materials, printed)
Signal processing approaches to secure physical layer communications in multi-antenna wireless systems[electronic resource] /
by:
(Language materials, printed)
Distributed denial of service attack and defense[electronic resource] /
by:
(Language materials, printed)
Computational intelligence, cyber security and computational models[electronic resource] :proceedings of ICC3, 2013 /
by:
(Language materials, printed)
Cyberspace and international relations[electronic resource] :theory, prospects and challenges /
by:
(Language materials, printed)
Ad hoc networks[electronic resource] :5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013 : revised selected papers /
by:
(Language materials, printed)
Information theoretic security[electronic resource] :7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Language materials, printed)
Distributed computing and internet technology[electronic resource] :10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014 : proceedings /
by:
(Language materials, printed)
Pairing-based cryptography - Pairing 2013[electronic resource] :6th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(Language materials, printed)
Distributed computing and networking[electronic resource] :15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014 : proceedings /
by:
(Language materials, printed)
Public key infrastructures, services and applications[electronic resource] :10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Privacy technologies and policy[electronic resource] :first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012 : revised selected papers /
by:
(Language materials, printed)
Future business software[electronic resource] :current trends in business software development /
by:
(Language materials, printed)
Recent trends in computer networks and distributed systems security[electronic resource] :second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2014[electronic resource] :the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Language materials, printed)
Passive and active measurement[electronic resource] :15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : proceedings /
by:
(Language materials, printed)
Public-key cryptography - PKC 2014[electronic resource] :17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings /
by:
(Language materials, printed)
Network hardening[electronic resource] :an automated approach to improving network security /
by:
(Language materials, printed)
Trustworthy global computing[electronic resource] :8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers /
by:
(Language materials, printed)
Information security applications[electronic resource] :14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013 : revised selected papers /
by:
(Language materials, printed)
Data privacy management and autonomous spontaneous security[electronic resource] :8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014 : proceedings /
by:
(Language materials, printed)
Information and communication technology[electronic resource] :second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 : proceedings /
by:
(Language materials, printed)
Transactions on data hiding and multimedia security IX[electronic resource] :Special Issue on Visual Cryptography /
by:
(Language materials, printed)
Building the infrastructure for cloud security[electronic resource] :a solutions view /
by:
(Language materials, printed)
Self- and co-regulation in cybercrime, cybersecurity and national security[electronic resource] /
by:
(Electronic resources)
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Advanced information systems engineering workshops[electronic resource] :CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015 : proceedings /
by:
(Electronic resources)
Intelligence and security informatics[electronic resource] :Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015 : proceedings /
by:
(Electronic resources)
Codes, cryptology, and information security[electronic resource] :first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015 : proceedings - In Honor of Thierry Berger /
by:
(Electronic resources)
Cyber security[electronic resource] :analytics, technology and automation /
by:
(Electronic resources)
Trustworthy computing and services[electronic resource] :International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(Language materials, printed)
Information security and privacy[electronic resource] :20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Intelligent mechanisms for network configuration and security[electronic resource] :9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015 : proceedings /
by:
(Language materials, printed)
Detection of intrusions and malware, and vulnerability assessment[electronic resource] :12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015 : proceedings /
by:
(Language materials, printed)
Data and applications security and privacy XXIX[electronic resource] :29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
by:
(Language materials, printed)
Cryptography and information security in the Balkans[electronic resource] :first International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015 : revised selected papers /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Encrypted email[electronic resource] :the history and technology of message privacy /
by:
(Language materials, printed)
Security in computing and communications[electronic resource] :third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
by:
(Language materials, printed)
Stabilization, safety, and security of distributed systems[electronic resource] :17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015 : proceedings /
by:
(Language materials, printed)
Information and communications security[electronic resource] :16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Interactive theorem proving[electronic resource] :6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015 : proceedings /
by:
(Language materials, printed)
Progress in Cryptology - LATINCRYPT 2015[electronic resource] :4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Language materials, printed)
E-Voting and identity[electronic resource] :5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015 : proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Trust, privacy and security in digital business[electronic resource] :12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
by:
(Language materials, printed)
Internet and distributed computing systems[electronic resource] :8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015 : proceedings /
by:
(Language materials, printed)
Information security[electronic resource] :18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 : proceedings /
by:
(Language materials, printed)
Information security theory and practice[electronic resource] :9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
(Language materials, printed)
Fast software encryption[electronic resource] :22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Secure wireless sensor networks[electronic resource] :threats and solutions /
by:
(Language materials, printed)
Global security, safety and sustainability[electronic resource] :tomorrow's challenges of cyber security : 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Modeling and evaluating denial of service attacks for wireless and mobile applications[electronic resource] /
by:
(Language materials, printed)
Visual cryptography for image processing and security[electronic resource] :theory, methods, and applications /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks[electronic resource] :10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.Part I /
by:
(Language materials, printed)
Advances in Digital Forensics XI[electronic resource] :11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Security and privacy for mobile healthcare networks[electronic resource] /
by:
(Language materials, printed)
Ad hoc networks[electronic resource] :7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015 : proceedings /
by:
(Language materials, printed)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(Language materials, printed)
Cyber security and privacy[electronic resource] :4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Digital forensics and cyber crime[electronic resource] :7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Language materials, printed)
Critical infrastructure protection IX[electronic resource] :9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Language materials, printed)
E-Democracy - citizen rights in the world of the new computing paradigms[electronic resource] :6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015 : proceedings /
by:
(Language materials, printed)
ISSE 2015[electronic resource] :highlights of the Information Security Solutions Europe 2015 Conference /
by:
(Language materials, printed)
Introduction to cryptography[electronic resource] :principles and applications /
by:
(Language materials, printed)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Service oriented and cloud computing[electronic resource] :4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Security, privacy, and applied cryptography engineering[electronic resource] :5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015 : proceedings /
by:
(Language materials, printed)
Computer security - ESORICS 2015[electronic resource] :20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Technology and practice of passwords[electronic resource] :International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Language materials, printed)
Computer safety, reliability, and security[electronic resource] :SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015 : proceedings /
by:
(Language materials, printed)
Computer safety, reliability, and security[electronic resource] :34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 : proceedings /
by:
(Language materials, printed)
Information and communication technology[electronic resource] :third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, held as part of WCC 2015, Daejeon, Korea, October 4-7, 2015 : proceedings /
by:
(Language materials, printed)
Radio frequency identification[electronic resource] :11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015 : revised selected papers /
by:
(Language materials, printed)
Security and trust management[electronic resource] :11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Language materials, printed)
Decision and game theory for security[electronic resource] :6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Language materials, printed)
Mobile, secure, and programmable networking[electronic resource] :first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(Language materials, printed)
Advanced concepts for intelligent vision systems[electronic resource] :16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Language materials, printed)
Provable security[electronic resource] :9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Security protocols XXIII[electronic resource] :23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Language materials, printed)
Future data and security engineering[electronic resource] :second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Language materials, printed)
On the move to meaningful internet systems[electronic resource] :OTM 2015 Conferences : Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015 : proceedings /
by:
(Language materials, printed)
Research in attacks,intrusions, and defenses[electronic resource] :18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015 : proceedings /
by:
(Language materials, printed)
Risk assessment and risk-driven testing[electronic resource] :third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(Language materials, printed)
Secure IT systems[electronic resource] :20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2015[electronic resource] :16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Language materials, printed)
Internet of vehicles - safe and intelligent mobility[electronic resource] :second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(Language materials, printed)
Evolution of cyber technologies and operations to 2035[electronic resource] /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks[electronic resource] :10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.Part II /
by:
(Language materials, printed)
Building secure defenses against code-reuse attacks[electronic resource] /
by:
(Language materials, printed)
E-business and telecommunications[electronic resource] :11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014 : revised selected papers /
by:
(Language materials, printed)
Multimedia communications, services and security[electronic resource] :8th International Conference, MCSS 2015, Krakow, Poland, November 24, 2015 : proceedings /
by:
(Language materials, printed)
Information systems security and privacy[electronic resource] :first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in computer science and ubiquitous computing[electronic resource] :CSA & CUTE /
by:
(Language materials, printed)
Information systems security[electronic resource] :11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(Language materials, printed)
Security standardisation research[electronic resource] :second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(Language materials, printed)
Cryptography and coding[electronic resource] :15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Innovative security solutions for information technology and communications[electronic resource] :8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Language materials, printed)
Trusted systems[electronic resource] :6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Language materials, printed)
Guide to security assurance for cloud computing[electronic resource] /
by:
(Language materials, printed)
Security and privacy in communication networks[electronic resource] :11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Big data concepts, theories, and applications[electronic resource] /
by:
(Language materials, printed)
E-business and telecommunications[electronic resource] :12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Lightweight cryptography for security and privacy[electronic resource] :4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Cryptography and information security in the Balkans[electronic resource] :second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015 : revised selected papers /
by:
(Language materials, printed)
Data privacy management, and security assurance[electronic resource] :10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Technology and practice of passwords[electronic resource] :9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015 : proceedings /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Passive and active measurement[electronic resource] :17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016 : proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications[electronic resource] :14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Language materials, printed)
Selected areas in cryptography - SAC 2015[electronic resource] :22nd International Conference, Sackville, NB, Canada, August 12-14, 2015 : revised selected papers /
by:
(Language materials, printed)
Privacy technologies and policy[electronic resource] :third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015 : revised selected papers /
by:
(Language materials, printed)
Critical information infrastructures security[electronic resource] :9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers /
by:
(Language materials, printed)
Intelligence and security informatics[electronic resource] :11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings /
by:
(Language materials, printed)
Digital-forensics and watermarking[electronic resource] :14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers /
by:
(Language materials, printed)
The new codebreakers[electronic resource] :essays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :5th International Conference, POST 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, the Netherlands, April 2-8, 2016 : proceedings /
by:
(Language materials, printed)
Mobile phone security and forensics[electronic resource] :a practical approach /
by:
(Language materials, printed)
Moving target defense for distributed systems[electronic resource] /
by:
(Language materials, printed)
Physical-layer security for cooperative relay networks[electronic resource] /
by:
(Language materials, printed)
Progress in cryptology - AFRICACRYPT 2016[electronic resource] :8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016 : proceedings /
by:
(Language materials, printed)
Risks and security of internet and systems[electronic resource] :10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part II /
by:
(Language materials, printed)
VoIP and PBX security and forensics[electronic resource] :a practical approach /
by:
(Language materials, printed)
Enforcing privacy[electronic resource] :regulatory, legal and technological approaches /
by:
(Language materials, printed)
Dynamic SQL[electronic resource] :applications, performance, and security /
by:
(Language materials, printed)
Privacy-enhancing aggregation techniques for smart grid communications[electronic resource] /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Language materials, printed)
Cloud computing[electronic resource] :6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015 : proceedings /
by:
(Language materials, printed)
Computer networks[electronic resource] :23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016 : proceedings /
by:
(Language materials, printed)
Critical Information Infrastructures Security[electronic resource] :10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015 : revised selected papers /
by:
(Language materials, printed)
Information security and cryptology[electronic resource] :11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 : revised selected papers /
by:
(Language materials, printed)
Recent advances in systems safety and security[electronic resource] /
by:
(Language materials, printed)
Combatting cybercrime and cyberterrorism[electronic resource] :challenges, trends and priorities /
by:
(Language materials, printed)
Secure system design and trustable computing[electronic resource] /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems[electronic resource] /
by:
(Language materials, printed)
Trends and applications in software engineering[electronic resource] :proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 /
by:
(Language materials, printed)
Advanced computing and systems for security.[electronic resource] /Volume 1
by:
(Language materials, printed)
Advanced computing and systems for security.[electronic resource] /Volume 2
by:
(Language materials, printed)
Distributed computing and internet technology[electronic resource] :12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016 : proceedings /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(Language materials, printed)
Transactions on large-scale data- and knowledge-centered systems XXIII[electronic resource] :selected papers from FDSE 2014 /
by:
(Language materials, printed)
Computational intelligence, cyber security and computational models[electronic resource] :proceedings of ICC3 2015 /
by:
(Language materials, printed)
SAP project management pitfalls[electronic resource] :how to avoid the most common pitfalls of an SAP solution /
by:
(Language materials, printed)
Cyber security[electronic resource] :second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015 : revised selected papers /
by:
(Language materials, printed)
Collaborative computing[electronic resource] :networking, applications, and worksharing : 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China : proceedings /
by:
(Language materials, printed)
Advances in parallel and distributed computing and ubiquitous services[electronic resource] :UCAWSN & PDCAT 2015 /
by:
(Language materials, printed)
Trustworthy global computing[electronic resource] :10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 : revised selected papers /
by:
(Language materials, printed)
Transactions on computational science XXVI[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(Language materials, printed)
Cybersecurity in the European Union[electronic resource] :resilience and adaptability in governance policy /
by:
(Language materials, printed)
Cybersecurity investments[electronic resource] :decision support under economic aspects /
by:
(Language materials, printed)
Boolean functions and their applications in cryptography[electronic resource] /
by:
(Language materials, printed)
Post-quantum cryptography[electronic resource] :7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2016[electronic resource] :the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Language materials, printed)
Graphical models for security[electronic resource] :second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
(Language materials, printed)
Public-key cryptography - PKC 2016[electronic resource] :19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Public-key cryptography - PKC 2016[electronic resource] :19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part II /
by:
(Language materials, printed)
Industrial espionage and technical surveillance counter measurers[electronic resource] /
by:
(Language materials, printed)
Information science and applications (ICISA) 2016[electronic resource] /
by:
(Language materials, printed)
Exploring the security landscape[electronic resource] :non-traditional security challenges /
by:
(Language materials, printed)
The accidental SysAdmin handbook[electronic resource] :a primer for early level IT professionals /
by:
(Language materials, printed)
Advanced information systems engineering workshops[electronic resource] :CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016 : proceedings /
by:
(Electronic resources)
Security-aware device-to-device communications underlaying cellular networks[electronic resource] /
by:
(Electronic resources)
Security and resiliency analytics for smart grids[electronic resource] :static and dynamic approaches /
by:
(Electronic resources)
Reliability, safety, and security of railway systems[electronic resource] :modelling, analysis, verification, and certification : first International Conference, RSSRail 2016, Paris, France, June 28-30, 2016 : proceedings /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust[electronic resource] :4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security[electronic resource] :14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Management and security in the age of hyperconnectivity[electronic resource] :10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part I /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systems[electronic resource] :first Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless network[electronic resource] :15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016 : proceedings /
by:
(Electronic resources)
Image analysis and recognition[electronic resource] :13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Povoa de Varzim, Portugal, July 13-15, 2016 : proceedings /
by:
(Electronic resources)
Watermarking security[electronic resource] :fundamentals, secure designs and attacks /
by:
(Electronic resources)
Proceedings of the International Congress on Information and Communication Technology[electronic resource] :ICICT 2015.Volume 2 /
by:
(Electronic resources)
Proceedings of the International Congress on Information and Communication Technology[electronic resource] :ICICT 2015.Volume 1 /
by:
(Electronic resources)
Beacon technologies[electronic resource] :the hitchhiker's guide to the Beacosystem /
by:
(Electronic resources)
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
by:
(Electronic resources)
Cyber deception[electronic resource] :building the scientific foundation /
by:
(Electronic resources)
Trust management X[electronic resource] :10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 : proceedings /
by:
(Electronic resources)
Elements of cloud computing security[electronic resource] :a survey of key practicalities /
by:
(Electronic resources)
Privacy and identity management[electronic resource] :time for a revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015 : revised selected papers /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part II /
by:
(Electronic resources)
Advances in neural networks - ISNN 2016[electronic resource] :13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXX[electronic resource] :30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design[electronic resource] :7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016 : revised selected papers /
by:
(Electronic resources)
Fast software encryption[electronic resource] :23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016[electronic resource] :36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016[electronic resource] :36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part III /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016[electronic resource] :36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part I /
by:
(Electronic resources)
Transactions on computational science XXVIII[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
The quest to cyber superiority[electronic resource] :cybersecurity regulations, frameworks, and strategies of major economies /
by:
(Electronic resources)
Cyber-security of SCADA and other industrial control systems[electronic resource] /
by:
(Electronic resources)
Preserving privacy against side-channel leaks[electronic resource] :from data publishing to web applications /
by:
(Electronic resources)
Industrial IoT technologies and applications[electronic resource] :International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016 : revised selected papers /
by:
(Electronic resources)
Technology and intimacy[electronic resource] :choice or coercion : 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016 : proceedings /
by:
(Electronic resources)
Mobile device management[electronic resource] :mobility evaluation in small and medium-sized enterprises /
by:
(Electronic resources)
Foundations of security analysis and design VIII[electronic resource] :FOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Trust, privacy, and security in digital business[electronic resource] :13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 : proceedings /
by:
(Electronic resources)
Database and expert systems applications[electronic resource] :27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Database and expert systems applications[electronic resource] :27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
Service-oriented and cloud computing[electronic resource] :5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks[electronic resource] :10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Privacy in statistical databases[electronic resource] :UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing[electronic resource] :9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security[electronic resource] :19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2016[electronic resource] :18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security[electronic resource] :FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016 : revised selected papers /
by:
(Electronic resources)
Building trust in information[electronic resource] :perspectives on the frontiers of provenance /
by:
(Electronic resources)
Practical Hive[electronic resource] :a guide to Hadoop's data warehouse system /
by:
(Electronic resources)
Advances in digital forensics XII[electronic resource] :12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Security in Computing and Communications[electronic resource] :4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Electronic resources)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016 : proceedings /
by:
(Electronic resources)
Advances in information and computer security[electronic resource] :11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016 : proceedings /
by:
(Electronic resources)
Privacy technologies and policy[electronic resource] :4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security[electronic resource] :35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings /
by:
(Electronic resources)
Research in attacks, intrusions, and defenses[electronic resource] :19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part I /
by:
(Electronic resources)
Information security theory and practice[electronic resource] :10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Internet and distributed computing systems[electronic resource] :9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016 : proceedings /
by:
(Electronic resources)
Graphical models for security[electronic resource] :third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016 : revised selected papers /
by:
(Electronic resources)
Network and system security[electronic resource] :10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
by:
(Electronic resources)
Internet of things, smart spaces, and next generation networks and systems[electronic resource] :16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016 : proceedings /
by:
(Electronic resources)
Security and trust management[electronic resource] :12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Autonomous agents and multiagent systems[electronic resource] :AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Data privacy management and security assurance[electronic resource] :11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
IT security risk control management[electronic resource] :an audit preparation plan /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilities[electronic resource] :a guide to detection and prevention /
by:
(Electronic resources)
Social network analysis in predictive policing[electronic resource] :concepts, models and methods /
by:
(Electronic resources)
Subjective logic[electronic resource] :a formalism for reasoning under uncertainty /
by:
(Electronic resources)
Elements of cloud storage security[electronic resource] :concepts, designs and optimized practices /
by:
(Electronic resources)
Current trends in web engineering[electronic resource] :ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016 : revised selected papers /
by:
(Electronic resources)
Innovative security solutions for information technology and communications[electronic resource] :9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Decision and game theory for security[electronic resource] :7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Secure IT systems[electronic resource] :21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
On the move to meaningful internet systems[electronic resource] :OTM 2016 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security[electronic resource] :15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Theory of cryptography[electronic resource] :14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography[electronic resource] :14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part II /
by:
(Electronic resources)
Oracle Application Express administration[electronic resource] :for DBAs and Developers /
by:
(Electronic resources)
The second economy[electronic resource] :the race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
Fundamentals of network forensics[electronic resource] :a research perspective /
by:
(Language materials, printed)
Wireless sensor networks[electronic resource] :security, coverage, and localization /
by:
(Language materials, printed)
Android application security[electronic resource] :a semantics and context-aware approach /
by:
(Language materials, printed)
Critical infrastructure protection X[electronic resource] :10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016 : revised selected papers /
by:
(Language materials, printed)
Security, privacy and anonymity in computation, communication and storage[electronic resource] :SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Information Theoretic Security[electronic resource] :9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016 : revised selected papers /
by:
(Language materials, printed)
Stabilization, safety, and security of distributed systems[electronic resource] :18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016 : proceedings /
by:
(Language materials, printed)
Information systems security[electronic resource] :12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2016[electronic resource] :22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2016[electronic resource] :22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part II /
by:
(Language materials, printed)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(Language materials, printed)
Certified Ethical Hacker (CEH) Foundation Guide[electronic resource] /
by:
(Language materials, printed)
Practical LPIC-1 Linux certification study guide[electronic resource] /
by:
(Language materials, printed)
Mobile, secure, and programmable networking[electronic resource] :second International Conference, MSPN 2016, Paris, France, June 1-3, 2016 : revised selected papers /
by:
(Language materials, printed)
Advances in visual computing[electronic resource] :12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016 : proceedings.Part II /
by:
(Language materials, printed)
Advances in visual computing[electronic resource] :12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Open source intelligence investigation[electronic resource] :from strategy to implementation /
by:
(Language materials, printed)
Subjects