Computer networks - Congresses. - Security measures
概要
作品: | 175 作品在 147 項出版品 147 種語言 |
---|
書目資訊
Security and cryptography for networks = 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Global security, safety, and sustainability = 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Security-enriched urban computing and smart grid = First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Decision and game theory for security = First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Vulnerability analysis on the computer network security : = implementation and practices /
by:
(書目-語言資料,印刷品)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(書目-電子資源)
ISSE 2012 securing electronic business processes = highlights of the Information Security Solutions Europe 2012 Conference /
by:
(書目-電子資源)
Trustworthly global computing = 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(書目-語言資料,印刷品)
Trust, privacy and security in digital business = 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Recent trends in network security and applications = third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Autonomic and trusted computing = 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(書目-語言資料,印刷品)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(書目-語言資料,印刷品)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Policies and research in identity management = Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Security and privacy in communication networks = 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Achieving systems safety = proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(書目-電子資源)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(書目-電子資源)
Future security = 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012 : proceedings /
by:
(書目-電子資源)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume II /
by:
(書目-電子資源)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume I /
by:
(書目-電子資源)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(書目-電子資源)
Security protocols XVIII = 18th International Workshop, Cambridge, UK, March 24-26, 2010 : revised selected papers /
by:
(書目-電子資源)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXIII = selected papers from FDSE 2014 /
by:
(書目-電子資源)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(書目-電子資源)
Secure IT systems = 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Network and system security = 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Practical deployment of Cisco Identity Services Engine (ISE) = real-world examples of AAA deployments /
by:
(書目-電子資源)
Handbook on securing cyber-physical critical infrastructure = foundation and challenges /
by:
(書目-電子資源)
Real-time security extensions for EPCglobal networks = case study for the pharmaceutical industry /
by:
(書目-電子資源)
Computational intelligence, cyber security and computational models = proceedings of ICC3, 2013 /
by:
(書目-電子資源)
Security and trust management = 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(書目-電子資源)
ISSE 2014 securing electronic business processes = highlights of the Information Security Solutions Europe 2014 Conference /
by:
(書目-電子資源)
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(書目-語言資料,印刷品)
Information security and privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(書目-語言資料,印刷品)
Data and applications security and privacy XXIX = 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
by:
(書目-語言資料,印刷品)
Security and trust management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(書目-電子資源)
Trusted systems = 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(書目-電子資源)
更多
較少的
主題