Electronic Books

Total Books: 21 - 40 /129
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...

Lire la suite
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

Lire la suite
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Lire la suite
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Lire la suite
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Lire la suite
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Lire la suite
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

Lire la suite
Cryptology and Network Security (vol. # 3810)

Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...

Lire la suite
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Lire la suite
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...

Lire la suite
NoIMG
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers

This book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...

Lire la suite
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Lire la suite
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...

Lire la suite
Database and Expert Systems Applications

This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lire la suite
Total Books: 21 - 40 /129