Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, Author: Clive Blackwell
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Automated Security Management, Author: Ehab Al-Shaer
Title: Number Theoretic Methods in Cryptography: Complexity lower bounds, Author: Igor Shparlinski
Title: Public-Key Cryptography, Author: Arto Salomaa
Title: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers, Author: Gilbert Peterson
Title: Foundations of Computer Security, Author: David Salomon
Title: Secure Information Management Using Linguistic Threshold Approach, Author: Marek R. Ogiela
Title: Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings, Author: Kai Rannenberg
Title: Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France, Author: Enrico Nardelli
Title: Violence in Nigeria: Patterns and Trends, Author: Patricia Taft
Title: Intrusion Detection in Distributed Systems: An Abstraction-Based Approach, Author: Peng Ning
Title: Information Security Planning: A Practical Approach, Author: Susan Lincke
Title: Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, Author: Mason Rice
Title: Network Science and Cybersecurity, Author: Robinson E. Pino
Title: Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers, Author: Michael Friedewald
Title: Trustworthy Ubiquitous Computing, Author: Ismail Khalil
Title: Complexity Theory and Cryptology: An Introduction to Cryptocomplexity, Author: Jörg Rothe
Title: Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, Author: Radu Sion

Pagination Links