Electronic Books

Total Books: 1 - 20 /20
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Lee mas
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Lee mas
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Lee mas
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Lee mas
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

Lee mas
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

Lee mas
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

Lee mas
Inter-Domain Management

Therearealreadymanyexcellentconferencesinthe?eldofNetworkofSystem Management : LISA, IM, NOMS, DSOM, Policy Workshop, etc. ...

Lee mas
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Lee mas
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

Lee mas
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

Lee mas
Resilient Networks and Services : Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings

The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...

Lee mas
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Lee mas
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Lee mas
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Lee mas
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Lee mas
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Lee mas
Total Books: 1 - 20 /20