Search Results - "Information security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 109
- Security measures 72
- Computer networks 53
- Data protection 44
- Management 29
- Information technology 21
- Access control 15
- Computers 11
- Information resources management 8
- Congresses 7
- Data encryption (Computer science) 7
- Business enterprises 6
- Computer crimes 6
- Cryptography 6
- Risk assessment 6
- Business intelligence 4
- Computer Security 4
- Data processing 4
- Electronic data processing departments 4
- Internet 4
- Management information systems 4
- Computer architecture 3
- Confidential business information 3
- Database security 3
- Handbooks, manuals, etc 3
- Investigation 3
- Law and legislation 3
- Prevention 3
- Standards 3
- Business 2
-
121
Intrusion Detection Systems
Published 2008“…Advances in information security…”
Click Here to View Status and Holdings.
Book -
122
Preserving privacy in data outsourcing
Published 2011“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
123
Towards hardware-intrinsic security foundations and practice
Published 2010“…Information security and cryptography…”
Click Here to View Status and Holdings.
Unknown -
124
Encryption for digital content
Published 2010“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
125
Insider threats in cyber security
Published 2010“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
126
CONTEMPORARY DIGITAL FORENSIC INVESTIGATIONS OF CLOUD AND MOBILE APPLICATIONS
Published 2017“…Syngress advanced topics in information security…”
Click Here to View Status and Holdings.
Manuscript Book -
127
MOBILE SECURITY AND PRIVACY Advances, Challenges and Future Research Directions
Published 2017“…Syngress advanced topics in information security…”
Click Here to View Status and Holdings.
Manuscript Book -
128
RFID security and privacy
Published 2014“…Synthesis lectures on information security, privacy and trust…”
Click Here to View Status and Holdings.
Unknown -
129
Privacy for location-based services
Published 2013“…Synthesis lectures on information security, privacy and trust…”
Click Here to View Status and Holdings.
Unknown -
130
Hardware Malware
Published 2013“…Synthesis lectures on information security, privacy and trust…”
Click Here to View Status and Holdings.
Book -
131
Private information retrieval
Published 2013“…Synthesis lectures on information security, privacy and trust…”
Click Here to View Status and Holdings.
Unknown -
132
Protocols for authentication and key establishment
Published 2003“…Information security and cryptography…”
Click Here to View Status and Holdings.
Unknown -
133
Fundamentals Of Network Security
Published 2004“…Information security series…”
Click Here to View Status and Holdings.
Book -
134
Image and video encrytion from digital rights management to secured personal communication
Published 2005“…Advances in information security;…”
Click Here to View Status and Holdings.
Unknown -
135
Biometric user authentication for IT security from fundamentals to handwriting
Published 2005“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
136
Security for wireless sensor networks
Published 2007“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
137
Multivariate public key cryptosystems
Published 2006“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
138
Data warehousing and data mining techniques for cyber security
Published 2007“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
139
Introduction to cryptography principles and applications
Published 2007“…Information security and cryptography…”
Click Here to View Status and Holdings.
Unknown -
140
Preserving privacy in on-line analytical processing (OLAP)
Published 2007“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown