Your search returned 62 results.

Not what you expected? Check for suggestions
Sort
Results
41.
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 ; proceedings / Hsinchun Chen [and others] (eds.). by Series: Lecture notes in computer science ; 6122.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
42.
Applied cryptography and network security : 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 ; proceedings / Jianying Zhou, Moti Yung (eds.). by Series: Lecture notes in computer science ; 6123.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
43.
44.
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / Javier Lopez, Bernhard M. Hämmerli (eds.). by Series: Lecture notes in computer science ; 5141. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 12559381
Publication details: Berlin ; New York : Springer, 2008
Other title:
  • CRITIS 2007
Online resources:
Availability: Items available for loan: e-Library (1).
45.
Distributed computing and internet technology : 6th international conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010 : proceedings / Tomasz Janowski, Hrushikesha Mohanty (eds.). by Series: Lecture notes in computer science ; 5966. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 12984480
Publication details: Berlin ; New York : Springer, ©2010
Other title:
  • ICDCIT 2010
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
46.
Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / Pierangela Samarati [and others] (eds.). by Series: Lecture notes in computer science ; 6033. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 80012255
Publication details: Berlin ; New York : Springer, ©2010
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
47.
Stabilization, safety, and security of distributed systems : 12th international symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, proceedings / Shlomi Dolev [and others] (eds.). by Series: Lecture notes in computer science ; 6366. | LNCS sublibrary. SL 1, Theoretical computer science and general issues.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
48.
Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings / Ron Steinfeld, Philip Hawkes (eds.). by Series: Lecture notes in computer science ; 6168.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
49.
50.
Advances in information and computer security : 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.). by Series: Lecture notes in computer science ; 6434. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Other title:
  • IWSEC 2010
Online resources:
Availability: Items available for loan: e-Library (1).
51.
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 : proceedings / Somesh Jha, Anish Mathuria (eds.). by Series: Lecture notes in computer science ; 6503. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
52.
53.
Open research problems in network security : IFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers / Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya (eds.). by Series: Lecture notes in computer science ; 6555.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Heidelberg ; New York : Springer, ©2011
Other title:
  • INetSec 2010
Online resources:
Availability: Items available for loan: e-Library (1).
54.
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings / Sushil Jajodia, Chandan Mazumdar (eds.). by Series: Lecture notes in computer science ; 7093. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2011
Online resources:
Availability: Items available for loan: e-Library (1).
55.
Business continuity management system : a complete framework for implementing ISO 22301 / Wei Ning Zechariah Wong, Jianping Shi. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: London ; Philadelphia : Kogan Page, 2015
Online resources:
Availability: Items available for loan: e-Library (1).
56.
Computer and information security handbook / edited by John R. Vacca. by
Edition: Third edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Copyright date: ©2017
Online resources:
Availability: Items available for loan: e-Library (1).
57.
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems / Eric D. Knapp, Joel Thomas Langill. by
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Waltham, MA : Syngress, [2015]Copyright date: ©2015
Online resources:
Availability: Items available for loan: e-Library (1).
58.
Handbook of security and networks [electronic resource] / editors, Yang Xiao, Frank H Li, Hui Chen. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hackensack, NJ : World Scientific, c2011
Online resources:
Availability: Items available for loan: e-Library (1).
59.
Cyberwarfare : an introduction to information-age conflict / Isaac R. Porche. by Series: Artech House intelligence and information operations series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Norwood, MA : Artech House, [2020]Copyright date: ©2020
Online resources:
Availability: Items available for loan: e-Library (1).
60.
Host integrity monitoring [electronic resource] : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Pub., ©2005
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha