Search Results - "information security"

  1. 121

    Intrusion Detection Systems

    Published 2008
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Book
  2. 122

    Preserving privacy in data outsourcing by Foresti, Sara

    Published 2011
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  3. 123

    Towards hardware-intrinsic security foundations and practice

    Published 2010
    “…Information security and cryptography…”
    Click Here to View Status and Holdings.
    Unknown
  4. 124

    Encryption for digital content by Kiayias, Aggelos

    Published 2010
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  5. 125

    Insider threats in cyber security

    Published 2010
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  6. 126

    CONTEMPORARY DIGITAL FORENSIC INVESTIGATIONS OF CLOUD AND MOBILE APPLICATIONS

    Published 2017
    “…Syngress advanced topics in information security…”
    Click Here to View Status and Holdings.
    Manuscript Book
  7. 127

    MOBILE SECURITY AND PRIVACY Advances, Challenges and Future Research Directions

    Published 2017
    “…Syngress advanced topics in information security…”
    Click Here to View Status and Holdings.
    Manuscript Book
  8. 128

    RFID security and privacy by Li, Yingjiu

    Published 2014
    “…Synthesis lectures on information security, privacy and trust…”
    Click Here to View Status and Holdings.
    Unknown
  9. 129

    Privacy for location-based services by Ghinita, Gabriel

    Published 2013
    “…Synthesis lectures on information security, privacy and trust…”
    Click Here to View Status and Holdings.
    Unknown
  10. 130

    Hardware Malware by Krieg, Christian, Dabrowski, Adrian, Hobel, Heidelinde, Krombholz, Katharina, Weippl, Edgar R.

    Published 2013
    “…Synthesis lectures on information security, privacy and trust…”
    Click Here to View Status and Holdings.
    Book
  11. 131

    Private information retrieval by Yi, Xun

    Published 2013
    “…Synthesis lectures on information security, privacy and trust…”
    Click Here to View Status and Holdings.
    Unknown
  12. 132

    Protocols for authentication and key establishment by Boyd, Colin

    Published 2003
    “…Information security and cryptography…”
    Click Here to View Status and Holdings.
    Unknown
  13. 133

    Fundamentals Of Network Security by Maiwald, Eric

    Published 2004
    “…Information security series…”
    Click Here to View Status and Holdings.
    Book
  14. 134
  15. 135
  16. 136

    Security for wireless sensor networks by Liu, Donggang

    Published 2007
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  17. 137

    Multivariate public key cryptosystems by Ding, Jintai

    Published 2006
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  18. 138

    Data warehousing and data mining techniques for cyber security by Singhal, Anoop 1958-

    Published 2007
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  19. 139

    Introduction to cryptography principles and applications by Delfs, Hans

    Published 2007
    “…Information security and cryptography…”
    Click Here to View Status and Holdings.
    Unknown
  20. 140

    Preserving privacy in on-line analytical processing (OLAP) by Wang, Lingyu

    Published 2007
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown