Electronic Books

Total Books: 61 - 80 /129
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

Lee mas
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Lee mas
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

Lee mas
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

Lee mas
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

Lee mas
Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...

Lee mas
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Lee mas
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

Lee mas
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Lee mas
NoIMG
Intelligent Network Management and Control: Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio / Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...

Lee mas
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

Lee mas
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

Lee mas
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

Lee mas
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lee mas
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Lee mas
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Lee mas
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

Lee mas
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

Lee mas
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

Lee mas
Network Security Policies and Procedures

This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...

Lee mas
Total Books: 61 - 80 /129