Electronic Books

Total Books: 61 - 70 /70
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Lee mas
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Lee mas
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

Lee mas
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...

Lee mas
Topics in Cryptology -- CT-RSA 2005

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...

Lee mas
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Lee mas
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

Lee mas
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Lee mas
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Lee mas
Total Books: 61 - 70 /70