 
                This book constitutes the proceedings of the 40th IFIP WG 6.1 International Conference on Formal Techniques for Distributed ...
Weiterlesen 
                Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Weiterlesen 
                Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art ...
Weiterlesen 
                Provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...
WeiterlesenProvides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...
Weiterlesen 
                This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Weiterlesen 
                Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Weiterlesen 
                The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Weiterlesen 
                This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
Weiterlesen 
                The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Weiterlesen 
                This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
Weiterlesen 
                This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Weiterlesen 
                INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Weiterlesen 
                This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
Weiterlesen 
                This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Weiterlesen 
                This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
WeiterlesenThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Weiterlesen