Languages
Jump To : Overview | Titles | Subjects

Jajodia, Sushil.

Overview
Works: 2 works in 12 publications in 1 languages
Titles
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings / by: Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan. (Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy/ by: Jajodia, Sushil.; SpringerLink (Online service); Cimato, Stelvio.; Samarati, Pierangela. (Language materials, printed)
Temporal databases = research and practice / by: Jajodia, Sushil.; SpringerLink (Online service); Etzion, Opher.; Sripada, Suryanarayana. (Language materials, printed)
Adaptive autonomous secure cyber systems by: Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Theory and models for cyber situation awareness by: Jajodia, Sushil.; SpringerLink (Online service); Liu, Peng.; Wang, Cliff. (Electronic resources)
Handbook of Database Security = Applications and Trends / by: Gertz, Michael.; Jajodia, Sushil.; SpringerLink (Online service) (Language materials, printed)
Network hardening = an automated approach to improving network security / by: Jajodia, Sushil.; SpringerLink (Online service); Wang, Lingyu.; Albanese, Massimiliano. (Electronic resources)
Secure cloud computing by: Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Security for Telecommunications Networks by: Jajodia, Sushil.; SpringerLink (Online service); McDaniel, Patrick.; Porta, Thomas La.; Traynor, Patrick. (Language materials, printed)
Data and applications security and privacy XXIV = 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings / by: Jajodia, Sushil.; SpringerLink (Online service); Foresti, Sara. (Language materials, printed)
Show more
Subjects
Computer security. Information resources management Data Structures, Cryptology and Information Theory. Software Engineering. Communications Engineering, Networks. Computer networks- Security measures. Relational databases Data protection Information Systems and Communication Service. Cyberspace operations (Military science) Logics and Meanings of Programs. Computer Crime. Data protection. Algorithm Analysis and Problem Complexity. Management of Computing and Information Systems. Operating Systems. Database Management. Multimedia systems Database design Wireless communication systems- Security measures Information Systems Applications (incl. Internet) Computer crimes. Artificial Intelligence (incl. Robotics) Computing Milieux. Special Purpose and Application-Based Systems. Information Storage and Retrieval. Telecommunication systems- Security measures. Ubiquitous computing Computer security- Graphic methods Database security Legal Aspects of Computing. Database management. Computer networks- Security measures Electronic Commerce/e-business. Computer fraud. Computer security Data Encryption. Computers- Access control Information Systems Applications (incl.Internet) Performance and Reliability. Cloud computing. Artificial Intelligence. Cyber intelligence (Computer security) Computer Science. Computer Communication Networks. Computers and Society. Systems and Data Security. Computer Systems Organization and Communication Networks. Machine learning. Probability and Statistics in Computer Science. Database security. Temporal databases. Cloud computing- Security measures. Internet- Security measures. Control theory.
 
 
Change password
Login