Computer security.
Overview
Works: | 1900 works in 385 publications in 385 languages |
---|
Titles
Digital forensics for network, Internet, and cloud computing = a forensic evidence guide for moving targets and data /
by:
(Language materials, printed)
Complexity Theory and Cryptology = An Introduction to Cryptocomplexity /
by:
(Language materials, printed)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Information assurance = dependability and security in networked systems /
by:
(Language materials, printed)
Information security architecture = an integrated approach to security in the organization /
by:
(Language materials, printed)
How to cheat at Windows System Administration using command line scripts
by:
(Language materials, printed)
Securing Windows server 2008 = prevent attacks from outside and inside your organization.
by:
(Language materials, printed)
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
by:
(Language materials, printed)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Language materials, printed)
The secure online business handbook = a practical guide to risk management and business continuity /
by:
(Language materials, printed)
Software engineering for secure systems : = industrial and research perspectives /
by:
(Language materials, printed)
Digital forensics for network, Internet, and cloud computing : = a forensic evidence guide for moving targets and data /
by:
(Language materials, printed)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
by:
(Language materials, printed)
Integrating security and software engineering = advances and future visions /
by:
(Language materials, printed)
No tech hacking = a guide to social engineering, dumpster diving, and shoulder surfing /
by:
(Language materials, printed)
Information warfare in business = strategies of control and resistance in the network society /
by:
(Language materials, printed)
Public key infrastructure = building trusted applications and Web services /
by:
(Language materials, printed)
Information security and ethics = concepts, methodologies, tools and applications /
by:
(Language materials, printed)
Computer security, privacy, and politics = current issues, challenges, and solutions /
by:
(Language materials, printed)
Database and applications security = integrating information security and data management /
by:
(Language materials, printed)
Digital privacy = PRIME - privacy and identity management for Europe /
by:
(Language materials, printed)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
Secure computer and network systems : = modeling, analysis and design /
by:
(Language materials, printed)
Information security = design, implementation, measurement, and compliance /
by:
(Language materials, printed)
Insider threat = protecting the enterprise from sabotage, spying, and theft /
by:
(Language materials, printed)
Database and applications security : = integrating information security and data management /
by:
(Language materials, printed)
Securing Windows server 2008 : = prevent attacks from outside and inside your organization/
by:
(Language materials, printed)
Physical and logical security convergence powered by enterprise security management
by:
(Language materials, printed)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Language materials, printed)
Software engineering for secure systems = industrial and research perspectives /
by:
(Language materials, printed)
Preventing good people from doing bad things = implementing least privilege /
by:
(Language materials, printed)
CISO soft skills : = securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by:
(Language materials, printed)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Language materials, printed)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
(Language materials, printed)
Security engineering : = a guide to building dependable distributed systems /
by:
(Language materials, printed)
Industrial network security = securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(Language materials, printed)
Web application obfuscation = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Language materials, printed)
Virtualization and forensics = a digital forensic investigator's guide to virtual environments /
by:
(Language materials, printed)
Hacking web apps = detecting and preventing web application security problems /
by:
(Language materials, printed)
Ninja hacking = unconventional penetration testing tactics and techniques /
by:
(Language materials, printed)
Windows registry forensics = advanced digital forensic analysis of the Windows registry /
by:
(Language materials, printed)
Network intrusion analysis = methodologies, tools, and techniques for incident analysis and response /
by:
(Language materials, printed)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Mobile device security : = a comprehensive guide to securing your information in a moving world /
by:
(Language materials, printed)
Digital business security development : = management technologies /
by:
(Language materials, printed)
Cryptography and coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Advanced concepts for intelligent vision systems = 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part II /
by:
(Language materials, printed)
Advances in Digital Forensics XI = 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II /
by:
(Language materials, printed)
Critical infrastructure protection IX = 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Language materials, printed)
Cryptology and network security = 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Language materials, printed)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(Language materials, printed)
Cyber operations = building, defending, and attacking modern computer networks /
by:
(Language materials, printed)
Cyber security and privacy = 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Decision and game theory for security = 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Language materials, printed)
Digital forensics and cyber crime = 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Language materials, printed)
E-Democracy - citizen rights in the world of the new computing paradigms = 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015 : proceedings /
by:
(Language materials, printed)
Future data and security engineering = second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.. Part I /
by:
(Language materials, printed)
Internet of vehicles - safe and intelligent mobility = second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Mobile, secure, and programmable networking = first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(Language materials, printed)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Language materials, printed)
Risk assessment and risk-driven testing = third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(Language materials, printed)
Privacy in a digital, networked world = technologies, implications and solutions /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2015 = 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Language materials, printed)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Language materials, printed)
Technology and practice of passwords = International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Language materials, printed)
Advances in artificial intelligence for privacy protection and security
by:
(Language materials, printed)
Security-aware systems applications and software development methods
by:
(Language materials, printed)
Anonymous security systems and applications = requirements and solutions /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Language materials, printed)
Situational awareness in computer network defense = principles, methods and applications /
by:
(Language materials, printed)
Digital identity and access management = technologies and frameworks /
by:
(Language materials, printed)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Language materials, printed)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(Language materials, printed)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(Language materials, printed)
Information technology risk management in enterprise environments : = a review of industry practices and a practical guide to risk management teams /
by:
(Language materials, printed)
Securing the cloud = cloud computer security techniques and tactics /
by:
(Language materials, printed)
Cloud security : = a comprehensive guide to secure cloud computing /
by:
(Language materials, printed)
Moving target defense II = application of game theory and adversarial modeling /
by:
(Language materials, printed)
The secure information society = ethical, legal and political challenges /
by:
(Language materials, printed)
Windows registry forensics : = advanced digital forensic analysis of the Windows registry /
by:
(Language materials, printed)
Cryptography and security = from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Language materials, printed)
Composition of secure multi-party protocols = a comprehensive study /
by:
(Language materials, printed)
Security engineering with patterns = origins, theoretical models, and new applications /
by:
(Language materials, printed)
Foundations of security analysis and design II = FOSAD 2001/2002 turorial lectures /
by:
(Language materials, printed)
Querying databases privately = a new approach to private information retrieval /
by:
(Language materials, printed)
Security in computing systems = challenges, approaches, and solutions /
by:
(Language materials, printed)
Engineering secure software and systems = First international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography
by:
(Language materials, printed)
Machine learning in cyber trust = security, privacy, and reliability /
by:
(Language materials, printed)
Theory and practice of cryptography solutions for secure information systems
by:
(Language materials, printed)
Social media security : = leveraging social networking while mitigating risk /
by:
(Language materials, printed)
Moodle security : = learn how to install and configure Moodle in the most secure way possible /
by:
(Language materials, printed)
Security de-engineering = solving the problems in information risk management /
by:
(Language materials, printed)
Advances in secure computing, internet services, and applications /
by:
(Language materials, printed)
Social media security = leveraging social networking while mitigating risk /
by:
(Language materials, printed)
The basics of IT audit = purposes, processes, and practical information /
by:
(Language materials, printed)
Defense against the black arts = how hackers do what they do and how to protect against it /
by:
(Language materials, printed)
The privacy engineer's manifesto = getting from policy to code to QA to value /
by:
(Language materials, printed)
BigNum math = implementing cryptographic multiple precision arithmetic /
by:
(Language materials, printed)
Embedded systems security = practical methods for safe and secure software and systems development /
by:
(Language materials, printed)
Enemy at the water cooler = real-life stories of insider threats and Enterprise Security Management countermeasures /
by:
(Language materials, printed)
Internet security = a jumpstart for systems administrators and IT managers /
by:
(Language materials, printed)
Implementing database security and auditing = a guide for DBA's, information security administrators and auditors /
by:
(Language materials, printed)
Information security risk assessment toolkit = practical assessments through data collection and data analysis /
by:
(Language materials, printed)
Malware forensics field guide for Windows systems = digital forensics field guides /
by:
(Language materials, printed)
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
by:
(Language materials, printed)
Perl scripting for Windows security = live response, forensic analysis, and monitoring /
by:
(Language materials, printed)
Practical embedded security = building secure resource-constrained systems /
by:
(Language materials, printed)
Securing HP NonStop servers in an open systems world = TCP/IP, OSS & SQL /
by:
(Language materials, printed)
WarDriving = drive, detect, defend : a guide towireless security /
by:
(Language materials, printed)
Techno Security's guide to managing risks = for IT managers, auditors, and investigators /
by:
(Language materials, printed)
The basics of hacking and penetration testing = ethical hacking and penetration testing made easy /
by:
(Language materials, printed)
The official CHFI exam 312-49 study guide = for computer hacking forensics investigators.
by:
(Language materials, printed)
Windows forensic analysis toolkit = advanced analysis techniques for Windows 7 /
by:
(Language materials, printed)
Linux malware incident response = a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems /
by:
(Language materials, printed)
Simple steps to data encryption = a practical guide to secure computing /
by:
(Language materials, printed)
Windows server 2012 security from end to edge and beyond = architecting, designing, planning, and deploying Windows server 2012 security solutions /
by:
(Language materials, printed)
Collaboration with cloud computing = security, social media, and unified communications /
by:
(Language materials, printed)
Windows forensic analysis toolkit = advanced analysis techniques for Windows 8 /
by:
(Language materials, printed)
Applied network security monitoring = collection, detection, and analysis /
by:
(Language materials, printed)
The Science and Technology of Counterterrorism = Measuring Physical and Electronic Security Risk /
by:
(Language materials, printed)
CSA guide to cloud computing = implementing cloud privacy and security /
by:
(Language materials, printed)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Language materials, printed)
Security for wireless sensor networks using identity-based cryptography
by:
(Language materials, printed)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(Language materials, printed)
Information security analytics : = finding security insights, patterns, and anomalies in big data /
by:
(Language materials, printed)
Cyber security, cyber crime and cyber forensics = applications and perspectives /
by:
(Language materials, printed)
Improving information security practices through computational intelligence /
by:
(Language materials, printed)
Applied cryptography : = protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems
by:
(Language materials, printed)
Transactions on computational science XXVI = special issue on cyberworlds and cybersecurity /
by:
(Language materials, printed)
Cybersecurity in the European Union = resilience and adaptability in governance policy /
by:
(Language materials, printed)
Smart card research and advanced applications = 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Language materials, printed)
Advanced information systems engineering workshops = CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016 : proceedings /
by:
(Language materials, printed)
Cyber-physical attack recovery procedures = a step-by-step preparation and response guide /
by:
(Language materials, printed)
Preserving privacy against side-channel leaks = from data publishing to web applications /
by:
(Language materials, printed)
Cybersecurity for hospitals and healthcare facilities = a guide to detection and prevention /
by:
(Language materials, printed)
Decision and game theory for security = 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(Language materials, printed)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Language materials, printed)
The second economy = the race for trust, treasure and time in the cybersecurity war /
by:
(Language materials, printed)
From hacking to report writing = an introduction to security and penetration testing /
by:
(Language materials, printed)
Cognitive hack : = the new battleground in cybersecurity... the human mind /
by:
(Language materials, printed)
Implementing cybersecurity : = a guide to the National Institute of Standards and Technology Risk Management Framework /
by:
(Language materials, printed)
Wireshark for security professionals = using Wireshark and the Metasploit Framework /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things
by:
(Language materials, printed)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(Language materials, printed)
What every engineer should know about cyber security and digital forensics
by:
(Language materials, printed)
Role mining in business = taming role-based access control administration /
by:
(Language materials, printed)
Handbook of system safety and security = cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /
by:
(Language materials, printed)
Information security science : = measuring the vulnerability to data compromises /
by:
(Language materials, printed)
Cybersecurity for industry 4.0 = analysis for design and manufacturing /
by:
(Language materials, printed)
Data privacy = foundations, new developments and the big data challenge /
by:
(Language materials, printed)
Combating security breaches and criminal activity in the digital sphere /
by:
(Language materials, printed)
Information security practices : = emerging threats and perspectives /
by:
(Language materials, printed)
Information technology risk management and compliance in modern organizations
by:
(Language materials, printed)
Investigative computer forensics = the practical guide for lawyers, accountants, investigators, and business executives /
by:
(Language materials, printed)
Risk centric threat modeling = process for attack simulation and threat analysis /
by:
(Language materials, printed)
Security intelligence = a practitioner's guide to solving enterprise security challenges /
by:
(Language materials, printed)
Safeguarding critical e-documents = implementing a program for securing confidential information assets /
by:
(Language materials, printed)
Transactions on computational science XXX = Special Issue on Cyberworlds and Cybersecurity /
by:
(Language materials, printed)
Advanced persistent training = take your security awareness program to the next level /
by:
(Language materials, printed)
Facing cyber threats head on : = protecting yourself and your business /
by:
(Language materials, printed)
Building a corporate culture of security = strategies for strengthening organizational resiliency /
by:
(Language materials, printed)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Building a HIPAA-compliant cybersecurity program = using NIST 800-30 and CSF to secure protected health information /
by:
(Language materials, printed)
Introduction to intelligent surveillance = surveillance data capture, transmission, and analytics /
by:
(Language materials, printed)
Cyber security on Azure = an IT professionals guide to Microsoft Azure security center /
by:
(Language materials, printed)
Advances in digital forensics XIII = 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Language materials, printed)
Fault tolerant architectures for cryptography and hardware security
by:
(Language materials, printed)
Enterprise cybersecurity study guide = how to build a successful cyberdefense program against advanced threats /
by:
(Language materials, printed)
Trusted digital circuits = hardware trojan vulnerabilities, prevention and detection /
by:
(Language materials, printed)
Physically unclonable functions = from basic design principles to advanced hardware security applications /
by:
(Language materials, printed)
Big digital forensic data.. Volume 2,. Quick analysis for evidence and intelligence
by:
(Language materials, printed)
Wireless algorithms, systems, and applications = 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018 : proceedings /
by:
(Language materials, printed)
Asset attack vectors = building effective vulnerability management strategies to protect organizations /
by:
(Language materials, printed)
Open source intelligence methods and tools = a practical guide to online intelligence /
by:
(Language materials, printed)
Guide to vulnerability analysis for computer networks and systems = an artificial intelligence approach /
by:
(Language materials, printed)
Firewalls don't stop dragons = a step-by-step guide to computer security for non-techies /
by:
(Language materials, printed)
Network intrusion detection using deep learning = a feature learning approach /
by:
(Language materials, printed)
Enhancing CBRNE safety & security = proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats /
by:
(Language materials, printed)
Software fault detection and correction = modeling and applications /
by:
(Language materials, printed)
From database to cyber security = essays dedicated to Sushil Jajodia on the occasion of his 70th birthday /
by:
(Language materials, printed)
Securing Office 365 = masterminding MDM and compliance in the cloud /
by:
(Language materials, printed)
Cybersecurity Ops with bash : = attack, defend, and analyze from the command line /
by:
(Language materials, printed)
Human aspects of IT for the aged population = aging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.. Part I /
by:
(Language materials, printed)
Human aspects of IT for the aged population = aging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.. Part II /
by:
(Language materials, printed)
Handbook of multimedia information security = techniques and applications /
by:
(Language materials, printed)
Navigating new cyber risks = how businesses can plan, build and manage safe spaces in the digital age /
by:
(Language materials, printed)
Cybersecurity and secure information systems = challenges and solutions in smart environments /
by:
(Language materials, printed)
Trustworthy cyber-physical systems = a systematic framework towards design and evaluation of trust and trustworthiness /
by:
(Language materials, printed)
Practical cyber forensics = an incident-based approach to forensic investigations /
by:
(Language materials, printed)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Language materials, printed)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Language materials, printed)
Reinforcement learning for cyber-physical systems with cybersecurity case studies /
by:
(Language materials, printed)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Language materials, printed)
Discrete dynamical systems and chaotic machines = theory and applications /
by:
(Language materials, printed)
From corporate security to commercial force : = a business leader's guide to security economics /
by:
(Language materials, printed)
Port cybersecurity : = securing critical information infrastructures and supply chains /
by:
(Language materials, printed)
Intelligent techniques in signal processing for multimedia security
by:
(Language materials, printed)
Concurrency, security, and puzzles = essays dedicated to Andrew William Roscoe on the occasion of his 60th birthday /
by:
(Language materials, printed)
Transactions on large-scale data- and knowledge-centered systems XXXI = special issue on data and security engineering /
by:
(Language materials, printed)
Hardware security and trust = design and deployment of integrated circuits in a threatened environment /
by:
(Language materials, printed)
Information security practices = emerging threats and perspectives /
by:
(Language materials, printed)
Fundamentals of IP and SoC security = design, verification, and debug /
by:
(Language materials, printed)
Data protection and privacy = (In)visibilities and infrastructures /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXIX = 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings /
by:
(Language materials, printed)
Cryptography and Information Security in the Balkans = First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Information and Computer Security = 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings /
by:
(Language materials, printed)
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I /
by:
(Language materials, printed)
Cyber Operations = Building, Defending, and Attacking Modern Computer Networks /
by:
(Language materials, printed)
Advances in Cryptology -- ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I /
by:
(Language materials, printed)
Privacy and Identity Management for the Future Internet in the Age of Globalisation = 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Distributed Computing and Internet Technology = 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings /
by:
(Language materials, printed)
Passive and Active Measurement = 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology = 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Progress in Cryptology - LATINCRYPT 2014 = Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers /
by:
(Language materials, printed)
Information Security and Privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /
by:
(Language materials, printed)
Digital-Forensics and Watermarking = 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers /
by:
(Language materials, printed)
E-Voting and Identity = 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology -- LATINCRYPT 2015 = 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /
by:
(Language materials, printed)
Security in Computing and Communications = Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /
by:
(Language materials, printed)
Information and Communication Technology = Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings /
by:
(Language materials, printed)
Advances in Digital Forensics XI = 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Security and Trust Management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings /
by:
(Language materials, printed)
Advanced Concepts for Intelligent Vision Systems = 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings /
by:
(Language materials, printed)
Security Protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Cryptology and Network Security = 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings /
by:
(Language materials, printed)
Risk Assessment and Risk-Driven Testing = Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers /
by:
(Language materials, printed)
Secure IT Systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings /
by:
(Language materials, printed)
E-Democracy: Citizen Rights in the World of the New Computing Paradigms = 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings /
by:
(Language materials, printed)
Security Standardisation Research = Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings /
by:
(Language materials, printed)
Cryptography and Coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings /
by:
(Language materials, printed)
Ad Hoc Networks = 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings /
by:
(Language materials, printed)
Multimedia Communications, Services and Security = 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedings /
by:
(Language materials, printed)
Information Systems Security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings /
by:
(Language materials, printed)
Information Systems Security and Privacy = First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security = 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings /
by:
(Language materials, printed)
Trust Management IX = 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /
by:
(Language materials, printed)
Game Theoretic Analysis of Congestion, Safety and Security = Traffic and Transportation Theory /
by:
(Language materials, printed)
Information and Communications Security = 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Stabilization, Safety, and Security of Distributed Systems = 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings /
by:
(Language materials, printed)
Information Security Education Across the Curriculum = 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings /
by:
(Language materials, printed)
Radio Frequency Identification = 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
by:
(Language materials, printed)
Financial Cryptography and Data Security = 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II /
by:
(Language materials, printed)
Theory of Cryptography = 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Cryptology -- CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I /
by:
(Language materials, printed)
Game Theoretic Analysis of Congestion, Safety and Security = Networks, Air Traffic and Emergency Departments /
by:
(Language materials, printed)
Information Theoretic Security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
by:
(Language materials, printed)
Interactive Theorem Proving = 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings /
by:
(Language materials, printed)
Information Security Risk Management = Risikomanagement mit ISO/IEC 27001, 27005 und 31010 /
by:
(Language materials, printed)
Konfliktmanagement für Sicherheitsprofis = Auswege aus der "Buhmann-Falle" für IT-Sicherheitsbeauftragte, Datenschützer und Co. /
by:
(Language materials, printed)
Future Data and Security Engineering = Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings /
by:
(Language materials, printed)
Decision and Game Theory for Security = 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings /
by:
(Language materials, printed)
Trustworthy Computing and Services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers /
by:
(Language materials, printed)
Current and Emerging Trends in Cyber Operations = Policy, Strategy and Practice /
by:
(Language materials, printed)
Cybercrime Risks and Responses = Eastern and Western Perspectives /
by:
(Language materials, printed)
Deterring Cyber Warfare = Bolstering Strategic Stability in Cyberspace /
by:
(Language materials, printed)
Cyber Denial, Deception and Counter Deception = A Framework for Supporting Active Cyber Defense /
by:
(Language materials, printed)
Advanced Information Systems Engineering Workshops = CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings /
by:
(Language materials, printed)
E-Business and Telecommunications = 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Handbuch Unternehmenssicherheit = Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit System /
by:
(Language materials, printed)
Visual Cryptography for Image Processing and Security = Theory, Methods, and Applications /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings /
by:
(Language materials, printed)
IT-Revision, IT-Audit und IT-Compliance = Neue Ansätze für die IT-Prüfung /
by:
(Language materials, printed)
Cyber Attack Information System = Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Computer Science and Ubiquitous Computing = CSA & CUTE /
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Modernes IT-Management = Methodische Kombination von IT-Strategie und IT-Reifegradmodell /
by:
(Language materials, printed)
ISSE 2015 = Highlights of the Information Security Solutions Europe 2015 Conference /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /
by:
(Language materials, printed)
Counterterrorism and Cybersecurity = Total Information Awareness /
by:
(Language materials, printed)
Attribute-based Credentials for Trust = Identity in the Information Society /
by:
(Language materials, printed)
Progress in Cryptology -- INDOCRYPT 2015 = 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I /
by:
(Language materials, printed)
Trusted Systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II /
by:
(Language materials, printed)
Information Security Practice and Experience = 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers /
by:
(Language materials, printed)
Internet and Distributed Computing Systems = 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings /
by:
(Language materials, printed)
Codes, Cryptology, and Information Security = First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger /
by:
(Language materials, printed)
Information Security = 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings /
by:
(Language materials, printed)
Fast Software Encryption = 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Risks and Security of Internet and Systems = 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Foundations and Practice of Security = 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers /
by:
(Language materials, printed)
Provable Security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings /
by:
(Language materials, printed)
Intelligence and Security Informatics = Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Research in Attacks, Intrusions, and Defenses = 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings /
by:
(Language materials, printed)
Internet of Vehicles - Safe and Intelligent Mobility = Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings /
by:
(Language materials, printed)
Service Oriented and Cloud Computing = 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedings /
by:
(Language materials, printed)
Information Security Applications = 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /
by:
(Language materials, printed)
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II /
by:
(Language materials, printed)
Public-Key Cryptography -- PKC 2015 = 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings /
by:
(Language materials, printed)
Trust and Trustworthy Computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings /
by:
(Language materials, printed)
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance = 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers /
by:
(Language materials, printed)
On the Move to Meaningful Internet Systems: OTM 2015 Conferences = Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings /
by:
(Language materials, printed)
Cyber Security and Privacy = 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Sicherheit von Webanwendungen in der Praxis = Wie sich Unternehmen schützen können – Hintergründe, Maßnahmen, Prüfverfahren und Prozesse /
by:
(Language materials, printed)
Network and System Security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings /
by:
(Language materials, printed)
Lightweight Cryptography for Security and Privacy = Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings /
by:
(Language materials, printed)
Der IT Security Manager = Aktuelles Praxiswissen für IT Security Manager und IT-Sicherheitsbeauftragte in Unternehmen und Behörden /
by:
(Language materials, printed)
Critical Infrastructure Protection IX = 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Pattern and Security Requirements = Engineering-Based Establishment of Security Standards /
by:
(Language materials, printed)
Frontiers in Internet Technologies = Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Intelligent Mechanisms for Network Configuration and Security = 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Bring your own Device – Ein Praxisratgeber = HMD Best Paper Award 2014 /
by:
(Language materials, printed)
Sicherheit im Online-Banking = PIN/TAN und HBCI im magischen Dreieck aus Sicherheit, Kosten und einfacher Bedienbarkeit /
by:
(Language materials, printed)
Topics in Cryptology –- CT-RSA 2015 = The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings /
by:
(Language materials, printed)
Advances in Cryptology -- CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II /
by:
(Language materials, printed)
Future Network Systems and Security = First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings /
by:
(Language materials, printed)
Principles of Security and Trust = 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings /
by:
(Language materials, printed)
Fast Software Encryption = 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers /
by:
(Language materials, printed)
Information Security and Cryptology - ICISC 2014 = 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Cybergefahr = Wie wir uns gegen Cyber-Crime und Online-Terror wehren können /
by:
(Language materials, printed)
Technology and Practice of Passwords = International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
by:
(Language materials, printed)
Sicherheit im Wandel von Technologien und Märkten = Tagungsband zur vierten EIT ICT Labs-Konferenz zur IT-Sicherheit /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Information and Computer Security = 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings /
by:
(Language materials, printed)
Principles of Security and Trust = 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings /
by:
(Language materials, printed)
Foundations of Security Analysis and Design VIII = FOSAD 2014/2015/2016 Tutorial Lectures /
by:
(Language materials, printed)
Security in Computing and Communications = 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Language materials, printed)
Proceedings of the International Congress on Information and Communication Technology = ICICT 2015, Volume 1 /
by:
(Language materials, printed)
Open Source Intelligence Investigation = From Strategy to Implementation /
by:
(Language materials, printed)
Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Service-Oriented and Cloud Computing = 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings /
by:
(Language materials, printed)
Availability, Reliability, and Security in Information Systems = IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings /
by:
(Language materials, printed)
Security and Resiliency Analytics for Smart Grids = Static and Dynamic Approaches /
by:
(Language materials, printed)
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
by:
(Language materials, printed)
Risks and Security of Internet and Systems = 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Trustworthy Global Computing = 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papers /
by:
(Language materials, printed)
Practical Information Security Management = A Complete Guide to Planning and Implementation /
by:
(Language materials, printed)
Die abschnittsbezogene Geschwindigkeitsüberwachung und ihre verfassungsrechtliche Bewertung
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Digital Forensics XII = 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Distributed Computing and Internet Technology = 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings /
by:
(Language materials, printed)
Digital-Forensics and Watermarking = 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Neural Networks – ISNN 2016 = 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings /
by:
(Language materials, printed)
Trust Management X = 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings /
by:
(Language materials, printed)
Privacy and Identity Management. Time for a Revolution? = 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Preserving Privacy Against Side-Channel Leaks = From Data Publishing to Web Applications /
by:
(Language materials, printed)
Cloud Computing = 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Management and Security in the Age of Hyperconnectivity = 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings /
by:
(Language materials, printed)
Elements of Cloud Storage Security = Concepts, Designs and Optimized Practices /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings /
by:
(Language materials, printed)
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification = First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings /
by:
(Language materials, printed)
Internet and Distributed Computing Systems = 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings /
by:
(Language materials, printed)
Future Data and Security Engineering = Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings /
by:
(Language materials, printed)
On the Move to Meaningful Internet Systems: OTM 2016 Conferences = Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedings /
by:
(Language materials, printed)
Privacy and Identity Management. Facing up to Next Steps = 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers /
by:
(Language materials, printed)
The Quest to Cyber Superiority = Cybersecurity Regulations, Frameworks, and Strategies of Major Economies /
by:
(Language materials, printed)
Physical and Data-Link Security Techniques for Future Communication Systems
by:
(Language materials, printed)
Internet of Things, Smart Spaces, and Next Generation Networks and Systems = 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
by:
(Language materials, printed)
Data Privacy Management, and Security Assurance = 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers /
by:
(Language materials, printed)
Current Trends in Web Engineering = ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papers /
by:
(Language materials, printed)
Information Systems Security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /
by:
(Language materials, printed)
Research in Attacks, Intrusions, and Defenses = 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings /
by:
(Language materials, printed)
Network and System Security = 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings /
by:
(Language materials, printed)
Computer Security – ESORICS 2016 = 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Decision and Game Theory for Security = 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings /
by:
(Language materials, printed)
US Power and the Internet in International Relations = The Irony of the Information Age /
by:
(Language materials, printed)
Building Trust in Information = Perspectives on the Frontiers of Provenance /
by:
(Language materials, printed)
Advanced Information Systems Engineering Workshops = CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXX = 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings /
by:
(Language materials, printed)
Industrial IoT Technologies and Applications = International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Information Literacy: Key to an Inclusive Society = 4th European Conference, ECIL 2016, Prague, Czech Republic, October 10-13, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Cybersecurity in the European Union = Resilience and Adaptability in Governance Policy /
by:
(Language materials, printed)
Lightweight Cryptography for Security and Privacy = 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Human Factors in Cybersecurity = Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA /
by:
(Language materials, printed)
Topics in Cryptology - CT-RSA 2016 = The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /
by:
(Language materials, printed)
Building a Comprehensive IT Security Program = Practical Guidelines and Best Practices /
by:
(Language materials, printed)
Collaborative Computing: Networking, Applications, and Worksharing = 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedings /
by:
(Language materials, printed)
Foundations and Practice of Security = 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Cryptography and Information Security in the Balkans = Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Cybersecurity for Hospitals and Healthcare Facilities = A Guide to Detection and Prevention /
by:
(Language materials, printed)
Information Security Applications = 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Combatting Cybercrime and Cyberterrorism = Challenges, Trends and Priorities /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Selected Areas in Cryptography - SAC 2015 = 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Information Theoretic Security = 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2016 = 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Informationssicherheits-Management = Leitfaden für Praktiker und Begleitbuch zur CISM-Zertifizierung /
by:
(Language materials, printed)
Data Privacy Management and Security Assurance = 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /
by:
(Language materials, printed)
Future Network Systems and Security = Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings /
by:
(Language materials, printed)
Information Security Practice and Experience = 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology - ICISC 2015 = 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Database and Expert Systems Applications = 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Sichere Multi-Faktor-Authentifizierung an Smartphones mithilfe des Tippverhaltens
by:
(Language materials, printed)
The Second Economy = The Race for Trust, Treasure and Time in the Cybersecurity War /
by:
(Language materials, printed)
Mobile Anwendungen in Unternehmen = Konzepte und betriebliche Einsatzszenarien /
by:
(Language materials, printed)
Proceedings of the International Congress on Information and Communication Technology = ICICT 2015, Volume 2 /
by:
(Language materials, printed)
From Hacking to Report Writing = An Introduction to Security and Penetration Testing /
by:
(Language materials, printed)
Exploring the Security Landscape: Non-Traditional Security Challenges
by:
(Language materials, printed)
Computational Intelligence, Cyber Security and Computational Models = Proceedings of ICC3 2015 /
by:
(Language materials, printed)
Computer Networks = 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedings /
by:
(Language materials, printed)
The Accidental SysAdmin Handbook = A Primer for Early Level IT Professionals /
by:
(Language materials, printed)
Trusted Web 4.0 - Konzepte einer digitalen Gesellschaft = Konzepte der Dezentralisierung und Anonymisierung /
by:
(Language materials, printed)
Global Security, Safety and Sustainability: The Security Challenges of the Connected World = 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings /
by:
(Language materials, printed)
Technology and Intimacy: Choice or Coercion = 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings /
by:
(Language materials, printed)
Beobachtungsmöglichkeiten im Domain Name System = Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz /
by:
(Language materials, printed)
Advances in Parallel and Distributed Computing and Ubiquitous Services = UCAWSN & PDCAT 2015 /
by:
(Language materials, printed)
IT-Sicherheitsmanagement nach der neuen ISO 27001 = ISMS, Risiken, Kennziffern, Controls /
by:
(Language materials, printed)
Wirtschaftsspionage = Phänomenologie – Erklärungsansätze – Handlungsoptionen /
by:
(Language materials, printed)
Cybersecurity Investments = Decision Support Under Economic Aspects /
by:
(Language materials, printed)
Oracle Application Express Administration = For DBAs and Developers /
by:
(Language materials, printed)
SAP Project Management Pitfalls = How to Avoid the Most Common Pitfalls of an SAP Solution /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings /
by:
(Language materials, printed)
Android Application Security = A Semantics and Context-Aware Approach /
by:
(Language materials, printed)
Mobile Device Management = Mobility Evaluation in Small and Medium-Sized Enterprises /
by:
(Language materials, printed)
Cyber Security = Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Computer Security – ESORICS 2016 = 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Theory of Cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Information Security and Cryptology = 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Graphical Models for Security = Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Theory of Cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Open Problems in Network Security = IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III /
by:
(Language materials, printed)
Information Security and Privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Public-Key Cryptography – PKC 2016 = 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Autonomous Agents and Multiagent Systems = AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Secure IT Systems = 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings /
by:
(Language materials, printed)
Transactions on Computational Science XXVI = Special Issue on Cyberworlds and Cybersecurity /
by:
(Language materials, printed)
Public-Key Cryptography – PKC 2016 = 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology – AFRICACRYPT 2016 = 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /
by:
(Language materials, printed)
Cryptographic Hardware and Embedded Systems – CHES 2016 = 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings /
by:
(Language materials, printed)
Privacy Technologies and Policy = 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Information Security = 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Trust and Trustworthy Computing = 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings /
by:
(Language materials, printed)
Technology and Practice of Passwords = 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2016 = 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Security and Trust Management = 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Security and Cryptography for Networks = 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings /
by:
(Language materials, printed)
Advances in Visual Computing = 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Privacy Technologies and Policy = Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Image Analysis and Recognition = 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedings /
by:
(Language materials, printed)
Ad-hoc, Mobile, and Wireless Networks = 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings /
by:
(Language materials, printed)
Cryptology and Network Security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings /
by:
(Language materials, printed)
Passive and Active Measurement = 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings /
by:
(Language materials, printed)
Information and Communications Security = 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII = Selected Papers from FDSE 2014 /
by:
(Language materials, printed)
Intelligence and Security Informatics = 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings /
by:
(Language materials, printed)
Stabilization, Safety, and Security of Distributed Systems = 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings /
by:
(Language materials, printed)
Post-Quantum Cryptography = 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings /
by:
(Language materials, printed)
Privacy in Statistical Databases = UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedings /
by:
(Language materials, printed)
Transactions on Computational Science XXVIII = Special Issue on Cyberworlds and Cybersecurity /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings /
by:
(Language materials, printed)
Enforcing Privacy = Regulatory, Legal and Technological Approaches /
by:
(Language materials, printed)
Human Aspects of Information Security, Privacy, and Trust = 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection X = 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers /
by:
(Language materials, printed)
The New Codebreakers = Essays Dedicated to David Kahn on the Occasion of His 85th Birthday /
by:
(Language materials, printed)
Provable Security = 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings /
by:
(Language materials, printed)
Database and Expert Systems Applications = 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Trends and Applications in Software Engineering = Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 /
by:
(Language materials, printed)
Advances in Visual Computing = 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Elements of Cloud Computing Security = A Survey of Key Practicalities /
by:
(Language materials, printed)
Information Security Theory and Practice = 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings /
by:
(Language materials, printed)
Information Security and Privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2016 = 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Cyber-Physical Attack Recovery Procedures = A Step-by-Step Preparation and Response Guide /
by:
(Language materials, printed)
Security-Aware Device-to-Device Communications Underlaying Cellular Networks
by:
(Language materials, printed)
Information Technology: New Generations = 13th International Conference on Information Technology /
by:
(Language materials, printed)
Fast Software Encryption = 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Social Network Analysis in Predictive Policing = Concepts, Models and Methods /
by:
(Language materials, printed)
Kryptografie verständlich = Ein Lehrbuch für Studierende und Anwender /
by:
(Language materials, printed)
Security, Privacy and Anonymity in Computation, Communication and Storage = SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings /
by:
(Language materials, printed)
E-Business and Telecommunications = 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers /
by:
(Language materials, printed)
Security of Industrial Control Systems and Cyber Physical Systems = First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers /
by:
(Language materials, printed)
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments = Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2018 = 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Lai-Massey Cipher Designs = History, Design Criteria and Cryptanalysis /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings /
by:
(Language materials, printed)
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference = Science as the first countermeasure for CBRNE and Cyber threats /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Web Services – ICWS 2018 = 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings /
by:
(Language materials, printed)
Humans and Machines at Work = Monitoring, Surveillance and Automation in Contemporary Capitalism /
by:
(Language materials, printed)
Dokumentationsmanagement – Basis für IT-Governance = 11 Schritte zur IT-Dokumentation /
by:
(Language materials, printed)
Advances in Neural Networks – ISNN 2018 = 15th International Symposium on Neural Networks, ISNN 2018, Minsk, Belarus, June 25–28, 2018, Proceedings /
by:
(Language materials, printed)
Human-Computer Interaction. Interaction Technologies = 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Pro iOS Security and Forensics = Enterprise iPhone and iPad Safety /
by:
(Language materials, printed)
IT-Sicherheit mit System = Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement – Sichere Anwendungen – Standards und Practices /
by:
(Language materials, printed)
Cyber Situational Awareness in Public-Private-Partnerships = Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen /
by:
(Language materials, printed)
Advances in Human Factors in Cybersecurity = Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2018 = 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I /
by:
(Language materials, printed)
IoT as a Service = Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedings /
by:
(Language materials, printed)
Advances in Multimedia Information Processing – PCM 2018 = 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Computational Data and Social Networks = 7th International Conference, CSoNet 2018, Shanghai, China, December 18–20, 2018, Proceedings /
by:
(Language materials, printed)
Human Interface and the Management of Information. Information in Applications and Services = 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Computer Security = 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Modeling Decisions for Artificial Intelligence = 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedings /
by:
(Language materials, printed)
Multi-Agent Systems and Agreement Technologies = 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Securing Office 365 = Masterminding MDM and Compliance in the Cloud /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedings /
by:
(Language materials, printed)
Frontiers in Cyber Security = First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings /
by:
(Language materials, printed)
Cybersecurity Best Practices = Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden /
by:
(Language materials, printed)
Cloud Computing and Security = 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Towards Autonomous Robotic Systems = 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings /
by:
(Language materials, printed)
Big Digital Forensic Data = Volume 2: Quick Analysis for Evidence and Intelligence /
by:
(Language materials, printed)
Fundamentals of Digital Forensics = Theory, Methods, and Real-Life Applications /
by:
(Language materials, printed)
Automated Technology for Verification and Analysis = 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings /
by:
(Language materials, printed)
Interoperability, Safety and Security in IoT = Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings /
by:
(Language materials, printed)
Auf der Spur der Hacker = Wie man die Täter hinter der Computer-Spionage enttarnt /
by:
(Language materials, printed)
Datenschutz – Konzepte, Algorithmen und Anwendung = Werkzeuge zum Datenschutz im Alltag /
by:
(Language materials, printed)
Die Fortentwicklung des Datenschutzes = Zwischen Systemgestaltung und Selbstregulierung /
by:
(Language materials, printed)
Secure IT Systems = 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings /
by:
(Language materials, printed)
Advances in Brain Inspired Cognitive Systems = 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings /
by:
(Language materials, printed)
Cyber Security Cryptography and Machine Learning = Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Recent Trends and Future Technology in Applied Intelligence = 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings /
by:
(Language materials, printed)
Cloud Computing and Security = 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV /
by:
(Language materials, printed)
Computer Security = 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Multimedia Information Processing – PCM 2018 = 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Internet of Vehicles. Technologies and Services Towards Smart City = 5th International Conference, IOV 2018, Paris, France, November 20–22, 2018, Proceedings /
by:
(Language materials, printed)
Designing for Privacy and its Legal Framework = Data Protection by Design and Default for the Internet of Things /
by:
(Language materials, printed)
Human-Computer Interaction. Theories, Methods, and Human Issues = 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Speech and Computer = 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18–22, 2018, Proceedings /
by:
(Language materials, printed)
From Database to Cyber Security = Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday /
by:
(Language materials, printed)
Securing the Perimeter = Deploying Identity and Access Management with Free Open Source Software /
by:
(Language materials, printed)
Internet Science = 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedings /
by:
(Language materials, printed)
Network Intrusion Detection using Deep Learning = A Feature Learning Approach /
by:
(Language materials, printed)
Emerging Technologies in Computing = First International Conference, iCETiC 2018, London, UK, August 23–24, 2018, Proceedings /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2018 = 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings /
by:
(Language materials, printed)
Ad-hoc, Mobile, and Wireless Networks = 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings /
by:
(Language materials, printed)
IT-Sicherheit für TCP/IP- und IoT-Netzwerke = Grundlagen, Konzepte, Protokolle, Härtung /
by:
(Language materials, printed)
Computer Performance Engineering = 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Intelligent Computing Theories and Application = 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Information Security Practice and Experience = 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
by:
(Language materials, printed)
Beginning Ethical Hacking with Kali Linux = Computational Techniques for Resolving Security Issues /
by:
(Language materials, printed)
Future Data and Security Engineering = 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings /
by:
(Language materials, printed)
Science of Cyber Security = First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Pattern Recognition and Computer Vision = First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Technology and the Intelligence Community = Challenges and Advances for the 21st Century /
by:
(Language materials, printed)
Cloud Computing and Security = 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III /
by:
(Language materials, printed)
Internet and Distributed Computing Systems = 11th International Conference, IDCS 2018, Tokyo, Japan, October 11–13, 2018, Proceedings /
by:
(Language materials, printed)
Advances in Information and Computer Security = 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection XII = 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Mathematical Software – ICMS 2018 = 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings /
by:
(Language materials, printed)
Cellular Automata = 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedings /
by:
(Language materials, printed)
Provenance and Annotation of Data and Processes = 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Information Security = 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Research and Practical Issues of Enterprise Information Systems = 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedings /
by:
(Language materials, printed)
Computer Vision – ECCV 2018 = 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part V /
by:
(Language materials, printed)
Data Privacy Management, Cryptocurrencies and Blockchain Technology = ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings /
by:
(Language materials, printed)
Cyberspace Safety and Security = 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings /
by:
(Language materials, printed)
Sicherheitskonzepte in der mobilen Kommunikation = Drahtlose Kommunikation – Protokolle und Gefahren /
by:
(Language materials, printed)
Simulation and Synthesis in Medical Imaging = Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation = 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Security Standardisation Research = 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings /
by:
(Language materials, printed)
Proceedings of the 2nd Workshop on Communication Security = Cryptography and Physical Layer Security /
by:
(Language materials, printed)
On the Move to Meaningful Internet Systems. OTM 2018 Conferences = Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Information and Communication Technology = Proceedings of ICICT 2016 /
by:
(Language materials, printed)
Biometric Recognition = 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings /
by:
(Language materials, printed)
Der Grundsatz der Verfügbarkeit = Ziel, Rechtsstand und Perspektiven des strafrechtlichen Informationsaustauschs in der Europäischen Union /
by:
(Language materials, printed)
Digitale Bürgerbeteiligung = Forschung und Praxis – Chancen und Herausforderungen der elektronischen Partizipation /
by:
(Language materials, printed)
Security and Trust Management = 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings /
by:
(Language materials, printed)
Digital Transformation: Challenges and Opportunities = 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Smart and Innovative Trends in Next Generation Computing Technologies = Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Smart Secure Systems – IoT and Analytics Perspective = Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings /
by:
(Language materials, printed)
Soft Computing Systems = Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Cloud Computing and Security = 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Guide to Vulnerability Analysis for Computer Networks and Systems = An Artificial Intelligence Approach /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Distributed Computing and Internet Technology = 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedings /
by:
(Language materials, printed)
Cloud Computing, Security, Privacy in New Computing Environments = 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
by:
(Language materials, printed)
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications = 22nd Iberoamerican Congress, CIARP 2017, Valparaíso, Chile, November 7–10, 2017, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Algorithms and Architectures for Parallel Processing = ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings /
by:
(Language materials, printed)
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII
by:
(Language materials, printed)
Recent Trends in Computer Applications = Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE /
by:
(Language materials, printed)
Combinatorial Algorithms = 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedings /
by:
(Language materials, printed)
Privacy in Statistical Databases = UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedings /
by:
(Language materials, printed)
Advances in Multimedia Information Processing – PCM 2018 = 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Research in Attacks, Intrusions, and Defenses = 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings /
by:
(Language materials, printed)
Network and System Security = 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings /
by:
(Language materials, printed)
Decision and Game Theory for Security = 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings /
by:
(Language materials, printed)
Intelligent Information Processing IX = 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings /
by:
(Language materials, printed)
Advances in Digital Forensics XIV = 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Wireless Communications under Hostile Jamming: Security and Efficiency
by:
(Language materials, printed)
Advances in Multimedia Information Processing – PCM 2017 = 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Intelligent Computing Methodologies = 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Human-Computer Interaction. Interaction in Context = 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings /
by:
(Language materials, printed)
Proceedings of International Symposium on Sensor Networks, Systems and Security = Advances in Computing and Networking with Applications /
by:
(Language materials, printed)
Progress in Artificial Intelligence and Pattern Recognition = 6th International Workshop, IWAIPR 2018, Havana, Cuba, September 24–26, 2018, Proceedings /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2018 = 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Principles of Security and Trust = 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
by:
(Language materials, printed)
Smart Trends in Systems, Security and Sustainability = Proceedings of WS4 2017 /
by:
(Language materials, printed)
Combinatorial Algorithms = 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Trusted Digital Circuits = Hardware Trojan Vulnerabilities, Prevention and Detection /
by:
(Language materials, printed)
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation = Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings /
by:
(Language materials, printed)
Trends and Applications in Knowledge Discovery and Data Mining = PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Internet of Things, Smart Spaces, and Next Generation Networks and Systems = 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings /
by:
(Language materials, printed)
Advances in Visual Computing = 13th International Symposium, ISVC 2018, Las Vegas, NV, USA, November 19 – 21, 2018, Proceedings /
by:
(Language materials, printed)
Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support = 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings /
by:
(Language materials, printed)
Information and Communications Security = 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /
by:
(Language materials, printed)
Trusted WEB 4.0 – Infrastruktur für eine Digitalverfassung = Handlungsempfehlungen für die Gesetzgebung, Gesellschaft und soziale Marktwirtschaft /
by:
(Language materials, printed)
Big Digital Forensic Data = Volume 1: Data Reduction Framework and Selective Imaging /
by:
(Language materials, printed)
Information Security and Cryptology = 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Progress in Cryptology – AFRICACRYPT 2018 = 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings /
by:
(Language materials, printed)
Mobile Ad-hoc and Sensor Networks = 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings /
by:
(Language materials, printed)
Designing for a Digital and Globalized World = 13th International Conference, DESRIST 2018, Chennai, India, June 3–6, 2018, Proceedings /
by:
(Language materials, printed)
Mobile Internet Security = First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Mobile Networks and Management = 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings /
by:
(Language materials, printed)
Advances in Multimedia Information Processing – PCM 2017 = 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Symbiotic Interaction = 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18–19, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Formal Techniques for Distributed Objects, Components, and Systems = 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings /
by:
(Language materials, printed)
Cyberspace Sovereignty = Reflections on building a community of common future in cyberspace /
by:
(Language materials, printed)
Distributed Applications and Interoperable Systems = 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings /
by:
(Language materials, printed)
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems = The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant /
by:
(Language materials, printed)
Passive and Active Measurement = 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedings /
by:
(Language materials, printed)
Image and Video Technology = PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Computer Networks = 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings /
by:
(Language materials, printed)
Information Systems Security and Privacy = Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Privacy and Identity Management. The Smart Revolution = 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Computational Science – ICCS 2018 = 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Smart and Innovative Trends in Next Generation Computing Technologies = Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Geo-Spatial Knowledge and Intelligence = 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Geo-Spatial Knowledge and Intelligence = 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Computational Science – ICCS 2018 = 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings /
by:
(Language materials, printed)
Edge Computing – EDGE 2018 = Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings /
by:
(Language materials, printed)
Image Analysis and Recognition = 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedings /
by:
(Language materials, printed)
Cloud Computing – CLOUD 2018 = 11th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25–30, 2018, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology – ICISC 2017 = 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Privatheit und selbstbestimmtes Leben in der digitalen Welt = Interdisziplinäre Perspektiven auf aktuelle Herausforderungen des Datenschutzes /
by:
(Language materials, printed)
Sicherheit von Webanwendungen in der Praxis = Wie sich Unternehmen schützen können – Hintergründe, Maßnahmen, Prüfverfahren und Prozesse /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings /
by:
(Language materials, printed)
Information Security Applications = 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Tests and Proofs = 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings /
by:
(Language materials, printed)
Fundamental Computing Forensics for Africa = A Case Study of the Science in Nigeria /
by:
(Language materials, printed)
Future Network Systems and Security = 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings /
by:
(Language materials, printed)
Enterprise Cybersecurity Study Guide = How to Build a Successful Cyberdefense Program Against Advanced Threats /
by:
(Language materials, printed)
IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen = HMD Best Paper Award 2017 /
by:
(Language materials, printed)
Cloud Infrastructures, Services, and IoT Systems for Smart Cities = Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedings /
by:
(Language materials, printed)
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by:
(Language materials, printed)
Practical Information Security = A Competency-Based Education Course /
by:
(Language materials, printed)
Computer Security = ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
by:
(Language materials, printed)
Theory and Practice of Model Transformation = 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25–26, 2018, Proceedings /
by:
(Language materials, printed)
Computational Science – ICCS 2018 = 18th International Conference, Wuxi, China, June 11–13, 2018 Proceedings, Part III /
by:
(Language materials, printed)
Information Security and Privacy = 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /
by:
(Language materials, printed)
Image and Signal Processing = 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings /
by:
(Language materials, printed)
Trust Management XII = 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings /
by:
(Language materials, printed)
Foundations and Practice of Security = 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Advanced Hybrid Information Processing = First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings /
by:
(Language materials, printed)
Information Security Theory and Practice = 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Blockchain – ICBC 2018 = First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings /
by:
(Language materials, printed)
Women in Security = Changing the Face of Technology and Innovation /
by:
(Language materials, printed)
Ubiquitous Communications and Network Computing = First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedings /
by:
(Language materials, printed)
Dynamic Logic. New Trends and Applications = First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings /
by:
(Language materials, printed)
Sicherheitskritische Mensch-Computer-Interaktion = Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement /
by:
(Language materials, printed)
Data Management Technologies and Applications = 6th International Conference, DATA 2017, Madrid, Spain, July 24–26, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Future Access Enablers for Ubiquitous and Intelligent Infrastructures = Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedings /
by:
(Language materials, printed)
Joint Security Management: organisationsübergreifend handeln = Mehr Sicherheit im Zeitalter von Cloud-Computing, IT-Dienstleistungen und industrialisierter IT-Produktion /
by:
(Language materials, printed)
The Huawei and Snowden Questions = Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /
by:
(Language materials, printed)
Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living = 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings /
by:
(Language materials, printed)
Sustainable Interdependent Networks = From Theory to Application /
by:
(Language materials, printed)
Graphical Models for Security = 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Smart Grid and Innovative Frontiers in Telecommunications = Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings /
by:
(Language materials, printed)
Game Theory for Security and Risk Management = From Theory to Practice /
by:
(Language materials, printed)
HCI in Business, Government, and Organizations = 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings /
by:
(Language materials, printed)
Engineering Psychology and Cognitive Ergonomics = 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings /
by:
(Language materials, printed)
Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment = 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXXII = 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings /
by:
(Language materials, printed)
Mathematical Modelling for Next-Generation Cryptography = CREST Crypto-Math Project /
by:
(Language materials, printed)
You: for sale = protecting your personal data and privacy online /
by:
(Language materials, printed)
Information security analytics = finding security insights, patterns, and anomalies in big data /
by:
(Language materials, printed)
The science and technology of counterterrorism = measuring physical and electronic security risk /
by:
(Language materials, printed)
Digital asset valuation and cyber risk measurement = principles of cybernomics /
by:
(Language materials, printed)
FinTech = the technology driving disruption in the financial services industry /
by:
(Language materials, printed)
Euro-Par 2018: Parallel Processing Workshops = Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Advanced Information Systems Engineering = 31st International Conference, CAiSE 2019, Rome, Italy, June 3–7, 2019, Proceedings /
by:
(Language materials, printed)
Graphical Models for Security = 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers /
by:
(Language materials, printed)
Development of Transport by Telematics = 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 – March 2, 2019, Selected Papers /
by:
(Language materials, printed)
Mobile Web and Intelligent Information Systems = 16th International Conference, MobiWIS 2019, Istanbul, Turkey, August 26–28, 2019, Proceedings /
by:
(Language materials, printed)
Perspectives in Business Informatics Research = 18th International Conference, BIR 2019, Katowice, Poland, September 23–25, 2019, Proceedings /
by:
(Language materials, printed)
Practical Security Properties on Commodity Computing Platforms = The uber eXtensible Micro-Hypervisor Framework /
by:
(Language materials, printed)
Blockchain – ICBC 2019 = Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings /
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Applied Computer Sciences in Engineering = 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16–18, 2019, Proceedings /
by:
(Language materials, printed)
Big Scientific Data Management = First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Machine Learning and Knowledge Discovery in Databases = European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part III /
by:
(Language materials, printed)
Trusted Computing and Information Security = 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers /
by:
(Language materials, printed)
SQL & NoSQL Databases = Models, Languages, Consistency Options and Architectures for Big Data Management /
by:
(Language materials, printed)
Trust Management XIII = 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings /
by:
(Language materials, printed)
Distributed Computing and Internet Technology = 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedings /
by:
(Language materials, printed)
Security and Safety Interplay of Intelligent Software Systems = ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Computational Data and Social Networks = 8th International Conference, CSoNet 2019, Ho Chi Minh City, Vietnam, November 18–20, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III /
by:
(Language materials, printed)
Information Security Practice and Experience = 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings /
by:
(Language materials, printed)
Security and Privacy = Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Theory of Cryptography = 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II /
by:
(Language materials, printed)
FinTech and Data Privacy in Germany = An Empirical Analysis with Policy Recommendations /
by:
(Language materials, printed)
Open Source Systems = 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedings /
by:
(Language materials, printed)
Science of Cyber Security = Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 3 /
by:
(Language materials, printed)
Knowledge Management in Organizations = 14th International Conference, KMO 2019, Zamora, Spain, July 15–18, 2019, Proceedings /
by:
(Language materials, printed)
Parallel and Distributed Computing, Applications and Technologies = 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Recent Trends in Image Processing and Pattern Recognition = Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part III /
by:
(Language materials, printed)
Smart Microgrids = From Design to Laboratory-Scale Implementation /
by:
(Language materials, printed)
Recent Trends in Image Processing and Pattern Recognition = Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Advances in Computing and Data Sciences = Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Selected Areas in Cryptography – SAC 2018 = 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Computer Security = ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Data Science = 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Computing and Network Sustainability = Proceedings of IRSCNS 2018 /
by:
(Language materials, printed)
Information Systems Security and Privacy = 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Database and Expert Systems Applications = DEXA 2019 International Workshops BIOKDD, IWCFS, MLKgraphs and TIR, Linz, Austria, August 26–29, 2019, Proceedings /
by:
(Language materials, printed)
Codes, Cryptology and Information Security = Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji /
by:
(Language materials, printed)
Advances in Digital Forensics XV = 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in New Computing Environments = Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings /
by:
(Language materials, printed)
Engineering Psychology and Cognitive Ergonomics = 16th International Conference, EPCE 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
by:
(Language materials, printed)
E-Business and Telecommunications = 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Deviance in Social Media and Social Cyber Forensics = Uncovering Hidden Relations Using Open Source Information (OSINF) /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings /
by:
(Language materials, printed)
Resilience of Cyber-Physical Systems = From Risk Modelling to Threat Counteraction /
by:
(Language materials, printed)
New Trends in Model and Data Engineering = MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28–31, 2019, Proceedings /
by:
(Language materials, printed)
Legal Aspects of Ethnic Data Collection and Positive Action = The Roma Minority in Europe /
by:
(Language materials, printed)
Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection = International Workshops of PAAMS 2019, Ávila, Spain, June 26–28, 2019, Proceedings /
by:
(Language materials, printed)
Heterogeneous Data Management, Polystores, and Analytics for Healthcare = VLDB 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
by:
(Language materials, printed)
The Practice of Enterprise Modeling = 12th IFIP Working Conference, PoEM 2019, Luxembourg, Luxembourg, November 27–29, 2019, Proceedings /
by:
(Language materials, printed)
Research and Practical Issues of Enterprise Information Systems = 13th IFIP WG 8.9 International Conference, CONFENIS 2019, Prague, Czech Republic, December 16–17, 2019, Proceedings /
by:
(Language materials, printed)
Building Digital Experience Platforms = A Guide to Developing Next-Generation Enterprise Applications /
by:
(Language materials, printed)
Security in Computing and Communications = 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Biomedical Engineering Systems and Technologies = 11th International Joint Conference, BIOSTEC 2018, Funchal, Madeira, Portugal, January 19–21, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Computer Vision – ECCV 2018 Workshops = Munich, Germany, September 8-14, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Information Security and Cryptology – ICISC 2018 = 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Computing and Data Sciences = Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Computer Analysis of Images and Patterns = 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II /
by:
(Language materials, printed)
IT-Sicherheit und Datenschutz im Gesundheitswesen = Leitfaden für Ärzte, Apotheker, Informatiker und Geschäftsführer in Klinik und Praxis /
by:
(Language materials, printed)
Advanced Informatics for Computing Research = Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Security and Privacy in Social Networks and Big Data = 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Software Engineering for Resilient Systems = 11th International Workshop, SERENE 2019, Naples, Italy, September 17, 2019, Proceedings /
by:
(Language materials, printed)
High-Performance Computing Applications in Numerical Simulation and Edge Computing = ACM ICS 2018 International Workshops, HPCMS and HiDEC, Beijing, China, June 12, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Introduction to Intelligent Surveillance = Surveillance Data Capture, Transmission, and Analytics /
by:
(Language materials, printed)
Understand, Manage, and Prevent Algorithmic Bias = A Guide for Business Users and Data Scientists /
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Human Centered Computing = 4th International Conference, HCC 2018, Mérida, Mexico, December, 5–7, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Applied Cryptography and Network Security Workshops = ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing = 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part III /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers /
by:
(Language materials, printed)
The NICE Cyber Security Framework = Cyber Security Intelligence and Analytics /
by:
(Language materials, printed)
Green, Pervasive, and Cloud Computing = 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Cyberspace Safety and Security = 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Financial Cybersecurity Risk Management = Leadership Perspectives and Guidance for Systems and Institutions /
by:
(Language materials, printed)
Communication Systems and Networks = 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers /
by:
(Language materials, printed)
Cyber Security Cryptography and Machine Learning = Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings /
by:
(Language materials, printed)
Cyberspace Safety and Security = 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Human Factors in Cybersecurity = Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA /
by:
(Language materials, printed)
Critical Infrastructure Security and Resilience = Theories, Methods, Tools and Technologies /
by:
(Language materials, printed)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
by:
(Language materials, printed)
Recent Trends in Communication, Computing, and Electronics = Select Proceedings of IC3E 2018 /
by:
(Language materials, printed)
IT-Revision, IT-Audit und IT-Compliance = Neue Ansätze für die IT-Prüfung /
by:
(Language materials, printed)
Advances in Cyber Security: Principles, Techniques, and Applications
by:
(Language materials, printed)
E-Business and Telecommunications = 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
by:
(Language materials, printed)
Information Security Theory and Practice = 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Principles of Security and Trust = 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXXIII = 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Information and Computer Security = 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings /
by:
(Language materials, printed)
Image Analysis and Recognition = 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Business Information Systems Workshops = BIS 2018 International Workshops, Berlin, Germany, July 18–20, 2018, Revised Papers /
by:
(Language materials, printed)
Business Process Management: Blockchain and Central and Eastern Europe Forum = BPM 2019 Blockchain and CEE Forum, Vienna, Austria, September 1–6, 2019, Proceedings /
by:
(Language materials, printed)
Machine Learning for Cyber Security = Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings /
by:
(Language materials, printed)
Sustainable Interdependent Networks II = From Smart Power Grids to Intelligent Transportation Networks /
by:
(Language materials, printed)
Data Privacy Management, Cryptocurrencies and Blockchain Technology = ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings /
by:
(Language materials, printed)
Secure IT Systems = 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings /
by:
(Language materials, printed)
Algebra, Codes and Cryptology = First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedings /
by:
(Language materials, printed)
Applied Cryptography in .NET and Azure Key Vault = A Practical Guide to Encryption in .NET and .NET Core /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings /
by:
(Language materials, printed)
Quality of Information and Communications Technology = 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11–13, 2019, Proceedings /
by:
(Language materials, printed)
Women Securing the Future with TIPPSS for IoT = Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /
by:
(Language materials, printed)
Computer Security – ESORICS 2019 = 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Computer Security – ESORICS 2019 = 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Information Security = 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Knowledge Discovery and Data Mining = 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I /
by:
(Language materials, printed)
New Trends in Computer Technologies and Applications = 23rd International Computer Symposium, ICS 2018, Yunlin, Taiwan, December 20–22, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems = The Third International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) /
by:
(Language materials, printed)
The Ecosystem of e-Business: Technologies, Stakeholders, and Connections = 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Explainable AI: Interpreting, Explaining and Visualizing Deep Learning
by:
(Language materials, printed)
System Administration Ethics = Ten Commandments for Security and Compliance in a Modern Cyber World /
by:
(Language materials, printed)
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 1 /
by:
(Language materials, printed)
Die Zukunft der Datenökonomie = Zwischen Geschäftsmodell, Kollektivgut und Verbraucherschutz /
by:
(Language materials, printed)
Next Generation and Advanced Network Reliability Analysis = Using Markov Models and Software Reliability Engineering /
by:
(Language materials, printed)
Service-Oriented Computing – ICSOC 2018 Workshops = ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Artificial Intelligence = 32nd Canadian Conference on Artificial Intelligence, Canadian AI 2019, Kingston, ON, Canada, May 28–31, 2019, Proceedings /
by:
(Language materials, printed)
Information Security Applications = 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Emerging Trends in Expert Applications and Security = Proceedings of ICETEAS 2018 /
by:
(Language materials, printed)
Economics of Grids, Clouds, Systems, and Services = 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Security and Quality in Cyber-Physical Systems Engineering = With Forewords by Robert M. Lee and Tom Gilb /
by:
(Language materials, printed)
Advances in Enterprise Engineering XII = 8th Enterprise Engineering Working Conference, EEWC 2018, Luxembourg, Luxembourg, May 28 – June 1, 2018, Proceedings /
by:
(Language materials, printed)
Security and Trust Management = 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings /
by:
(Language materials, printed)
Information and Software Technologies = 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings /
by:
(Language materials, printed)
Passive and Active Measurement = 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27–29, 2019, Proceedings /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings /
by:
(Language materials, printed)
Data Mining = 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28–30, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Smart City and Informatization = 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology = 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Smart Innovations in Communication and Computational Sciences = Proceedings of ICSICCS 2017, Volume 1 /
by:
(Language materials, printed)
How to Speak Tech = The Non-Techie’s Guide to Key Technology Concepts /
by:
(Language materials, printed)
Information Systems = 15th European, Mediterranean, and Middle Eastern Conference, EMCIS 2018, Limassol, Cyprus, October 4-5, 2018, Proceedings /
by:
(Language materials, printed)
Intelligent Technologies and Applications = First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Business Information Systems Workshops = BIS 2019 International Workshops, Seville, Spain, June 26–28, 2019, Revised Papers /
by:
(Language materials, printed)
Progress in Cryptology – AFRICACRYPT 2019 = 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings /
by:
(Language materials, printed)
Graphical Models for Security = 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Computational Intelligence = 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Design, User Experience, and Usability. Practice and Case Studies = 8th International Conference, DUXU 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings, Part IV /
by:
(Language materials, printed)
Advances in Computational Intelligence = 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part II /
by:
(Language materials, printed)
On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence = Themes from IACAP 2016 /
by:
(Language materials, printed)
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings /
by:
(Language materials, printed)
Contemporary Advances in Innovative and Applicable Information Technology = Proceedings of ICCAIAIT 2018 /
by:
(Language materials, printed)
Frontiers in Cyber Security = Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings /
by:
(Language materials, printed)
Green, Pervasive, and Cloud Computing = 14th International Conference, GPC 2019, Uberlândia, Brazil, May 26–28, 2019, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Biometric Recognition = 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12–13, 2019, Proceedings /
by:
(Language materials, printed)
HCI for Cybersecurity, Privacy and Trust = First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
by:
(Language materials, printed)
Emerging Technologies in Computing = Second International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings /
by:
(Language materials, printed)
Machine Learning and Knowledge Extraction = Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26–29, 2019, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Grundrechtsschutz im Smart Car = Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug /
by:
(Language materials, printed)
International Conference on Advanced Computing Networking and Informatics = ICANI-2018 /
by:
(Language materials, printed)
Grundlagen und Anwendung von Information Security Awareness = Mitarbeiter zielgerichtet für Informationssicherheit sensibilisieren /
by:
(Language materials, printed)
Model-Based Safety and Assessment = 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16–18, 2019, Proceedings /
by:
(Language materials, printed)
Services – SERVICES 2019 = 15th World Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural Computation = 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings /
by:
(Language materials, printed)
Digital Forensics and Watermarking = 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings /
by:
(Language materials, printed)
Distributed Applications and Interoperable Systems = 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Web Services – ICWS 2019 = 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III /
by:
(Language materials, printed)
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
by:
(Language materials, printed)
Communication Technologies for Vehicles = 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16–17, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Data Science, Cyber Security and IT Applications = First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten = Eine kompakte Einführung in die Praxis /
by:
(Language materials, printed)
Proceedings of International Ethical Hacking Conference 2018 = eHaCON 2018, Kolkata, India /
by:
(Language materials, printed)
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Quick Start Guide to Penetration Testing = With NMAP, OpenVAS and Metasploit /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2019: Deep Learning = 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Computer Vision – ACCV 2018 = 14th Asian Conference on Computer Vision, Perth, Australia, December 2–6, 2018, Revised Selected Papers, Part VI /
by:
(Language materials, printed)
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 2 /
by:
(Language materials, printed)
Computer Networks = 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25–27, 2019, Proceedings /
by:
(Language materials, printed)
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Geographical Information Systems Theory, Applications and Management = 4th International Conference, GISTAM 2018, Funchal, Madeira, Portugal, March 17–19, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Distributed Computer and Communication Networks = 22nd International Conference, DCCN 2019, Moscow, Russia, September 23–27, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Privacy Technologies and Policy = 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings /
by:
(Language materials, printed)
VLSI Design and Test = 23rd International Symposium, VDAT 2019, Indore, India, July 4–6, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2019 = 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings /
by:
(Language materials, printed)
Network and System Security = 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings /
by:
(Language materials, printed)
Computer Vision – ECCV 2018 Workshops = Munich, Germany, September 8-14, 2018, Proceedings, Part V /
by:
(Language materials, printed)
Innovations in Computer Science and Engineering = Proceedings of the Sixth ICICSE 2018 /
by:
(Language materials, printed)
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data = 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Cyber Security = 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers /
by:
(Language materials, printed)
International Conference on Computer Networks and Communication Technologies = ICCNCT 2018 /
by:
(Language materials, printed)
Third International Congress on Information and Communication Technology = ICICT 2018, London /
by:
(Language materials, printed)
Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics = Second International Conference, ICETCE 2019, Jaipur, India, February 1–2, 2019, Revised Selected Papers /
by:
(Language materials, printed)
HCI International 2019 - Posters = 21st International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Beyond Databases, Architectures and Structures. Paving the Road to Smart Data Processing and Analysis = 15th International Conference, BDAS 2019, Ustroń, Poland, May 28–31, 2019, Proceedings /
by:
(Language materials, printed)
Creativity in Intelligent Technologies and Data Science = Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part I /
by:
(Language materials, printed)
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy = Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday /
by:
(Language materials, printed)
ICT Unbounded, Social Impact of Bright ICT Adoption = IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedings /
by:
(Language materials, printed)
ECML PKDD 2018 Workshops = MIDAS 2018 and PAP 2018, Dublin, Ireland, September 10-14, 2018, Proceedings /
by:
(Language materials, printed)
Cybersecurity and Secure Information Systems = Challenges and Solutions in Smart Environments /
by:
(Language materials, printed)
Technology Enhanced Assessment = 21st International Conference, TEA 2018, Amsterdam, The Netherlands, December 10–11, 2018, Revised Selected Papers /
by:
(Language materials, printed)
High-Performance Computing and Big Data Analysis = Second International Congress, TopHPC 2019, Tehran, Iran, April 23–25, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Critical Infrastructure Protection XIII = 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Information and Operational Technology Security Systems = First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Dependability in Sensor, Cloud, and Big Data Systems and Applications = 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings /
by:
(Language materials, printed)
ECML PKDD 2018 Workshops = Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings /
by:
(Language materials, printed)
Information Security and Privacy = 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings /
by:
(Language materials, printed)
PRICAI 2019: Trends in Artificial Intelligence = 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part III /
by:
(Language materials, printed)
Artificial Neural Networks and Machine Learning – ICANN 2019: Text and Time Series = 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IV /
by:
(Language materials, printed)
Advanced Informatics for Computing Research = Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Hybrid Artificial Intelligent Systems = 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedings /
by:
(Language materials, printed)
Proceedings of the 2nd International Conference on Data Engineering and Communication Technology = ICDECT 2017 /
by:
(Language materials, printed)
Decision and Game Theory for Security = 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings /
by:
(Language materials, printed)
Innovations in Computer Science and Engineering = Proceedings of the Fifth ICICSE 2017 /
by:
(Language materials, printed)
Situational Privacy and Self-Disclosure = Communication Processes in Online Environments /
by:
(Language materials, printed)
Smart Innovations in Communication and Computational Sciences = Proceedings of ICSICCS 2017, Volume 2 /
by:
(Language materials, printed)
Cybersecurity attacks : = Red Team strategies : a practical guide to building a penetration testing program having homefield advantage /
by:
(Language materials, printed)
Cybersecurity threats, malware trends, and strategies : = mitigate exploits, malware, phishing, and other social engineering attacks /
by:
(Language materials, printed)
Open Source Intelligence and Cyber Crime = Social Media Analytics /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 12th International Conference, SecITC 2019, Bucharest, Romania, November 14–15, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Digital Economy = First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings /
by:
(Language materials, printed)
Information Security Applications = 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Gut gepackt – Kein Bit zu viel = Kompression digitaler Daten verständlich erklärt /
by:
(Language materials, printed)
Data Visualization = Trends and Challenges Toward Multidisciplinary Perception /
by:
(Language materials, printed)
E-Business and Telecommunications = 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers /
by:
(Language materials, printed)
New Paradigm in Decision Science and Management = Proceedings of ICDSM 2018 /
by:
(Language materials, printed)
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Human Factors in Cybersecurity = Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA /
by:
(Language materials, printed)
Demystifying Internet of Things Security = Successful IoT Device/Edge and Platform Security Deployment /
by:
(Language materials, printed)
Machine Learning, Image Processing, Network Security and Data Sciences = Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Emerging Technology in Modelling and Graphics = Proceedings of IEM Graph 2018 /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings /
by:
(Language materials, printed)
Computer Security = ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers /
by:
(Language materials, printed)
Business Information Systems Workshops = BIS 2020 International Workshops, Colorado Springs, CO, USA, June 8–10, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Information Security Theory and Practice = 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings /
by:
(Language materials, printed)
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Information Systems = 16th European, Mediterranean, and Middle Eastern Conference, EMCIS 2019, Dubai, United Arab Emirates, December 9–10, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2020 = 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Blockchain and Trustworthy Systems = First International Conference, BlockSys 2019, Guangzhou, China, December 7–8, 2019, Proceedings /
by:
(Language materials, printed)
Intelligent Computing and Innovation on Data Science = Proceedings of ICTIDS 2019 /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXXIV = 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Image Analysis and Recognition = 17th International Conference, ICIAR 2020, Póvoa de Varzim, Portugal, June 24–26, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Cyber Security Cryptography and Machine Learning = Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings /
by:
(Language materials, printed)
Information Systems Security and Privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Privacy and Identity Management. Data for Better Living: AI and Privacy = 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Artificial Intelligence = 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, Ottawa, ON, Canada, May 13–15, 2020, Proceedings /
by:
(Language materials, printed)
Engineering Psychology and Cognitive Ergonomics. Cognition and Design = 17th International Conference, EPCE 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Artificial Intelligence in HCI = First International Conference, AI-HCI 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings /
by:
(Language materials, printed)
Advances in Data Sciences, Security and Applications = Proceedings of ICDSSA 2019 /
by:
(Language materials, printed)
Cyber Crisis Management = Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation /
by:
(Language materials, printed)
Konfliktmanagement für Sicherheitsprofis = Auswege aus der „Buhmann-Falle“ für Informations- und IT-Sicherheitsbeauftragte, Datenschützer, CISOs und Co. /
by:
(Language materials, printed)
Device-Independent Quantum Information Processing = A Simplified Analysis /
by:
(Language materials, printed)
Fundamentals of Brooks–Iyengar Distributed Sensing Algorithm = Trends, Advances, and Future Prospects /
by:
(Language materials, printed)
Multimedia Big Data Computing for IoT Applications = Concepts, Paradigms and Solutions /
by:
(Language materials, printed)
Fourth International Congress on Information and Communication Technology = ICICT 2019, London, Volume 1 /
by:
(Language materials, printed)
Computer Security = ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2020 = 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Computer Vision – ECCV 2020 = 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part IX /
by:
(Language materials, printed)
Fourth International Congress on Information and Communication Technology = ICICT 2019, London, Volume 2 /
by:
(Language materials, printed)
Financial Cryptography and Data Security = FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Human Aspects of Information Security and Assurance = 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings /
by:
(Language materials, printed)
Nuclear Non-proliferation and Arms Control Verification = Innovative Systems Concepts /
by:
(Language materials, printed)
Information Security and Privacy = 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2020 = 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Frontiers in Cyber Security = Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings /
by:
(Language materials, printed)
Intelligent Information Processing X = 11th IFIP TC 12 International Conference, IIP 2020, Hangzhou, China, July 3–6, 2020, Proceedings /
by:
(Language materials, printed)
Big Data and Security = First International Conference, ICBDS 2019, Nanjing, China, December 20–22, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2020 = 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten = Eine kompakte Einführung in die Praxis /
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2 /
by:
(Language materials, printed)
Public-Key Cryptography – PKC 2020 = 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Public-Key Cryptography – PKC 2020 = 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Cyber-Security in Critical Infrastructures = A Game-Theoretic Approach /
by:
(Language materials, printed)
Decoding Blockchain for Business = Understand the Tech and Prepare for the Blockchain Future /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 39th International Conference, SAFECOMP 2020, Lisbon, Portugal, September 16–18, 2020, Proceedings /
by:
(Language materials, printed)
Passive and Active Measurement = 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings /
by:
(Language materials, printed)
Graphical Models for Security = 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers /
by:
(Language materials, printed)
The Security of Critical Infrastructures = Risk, Resilience and Defense /
by:
(Language materials, printed)
Selected Areas in Cryptography – SAC 2019 = 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Digital Forensics XVI = 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Security and Cryptography for Networks = 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings /
by:
(Language materials, printed)
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems = The Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) /
by:
(Language materials, printed)
The Coupling of Safety and Security = Exploring Interrelations in Theory and Practice /
by:
(Language materials, printed)
IT-Sicherheitsmanagement nach der neuen ISO 27001 = ISMS, Risiken, Kennziffern, Controls /
by:
(Language materials, printed)
Advances in Information and Computer Security = 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2–4, 2020, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology – ICISC 2019 = 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Progress in Cryptology - AFRICACRYPT 2020 = 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology = 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers /
by:
(Language materials, printed)
HCI for Cybersecurity, Privacy and Trust = Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings /
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 1 /
by:
(Language materials, printed)
Das S-Netzwerk und sein wirtschaftliches Potenzial = Die Möglichkeiten des S-Webs und der Jadwirtschaft mit der Einweg-Währung Jad /
by:
(Language materials, printed)
Sachkunde im Bewachungsgewerbe (IHK) = Lehrbuch für Prüfung und Praxis /
by:
(Language materials, printed)
Trusted Computing and Information Security = 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Internet of Things—Applications and Future = Proceedings of ITAF 2019 /
by:
(Language materials, printed)
Machine Learning for Cyber Security = Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III /
by:
(Language materials, printed)
The Darknet and Smarter Crime = Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy /
by:
(Language materials, printed)
Embedded Systems and Artificial Intelligence = Proceedings of ESAI 2019, Fez, Morocco /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2020 = 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Reversible Steganography and Authentication via Transform Encoding
by:
(Language materials, printed)
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Machine Learning for Cyber Security = Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Blockchain and Trustworthy Systems = Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch = 250 Fragen mit Antworten und 10 Übungsfälle mit Lösungen /
by:
(Language materials, printed)
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Post-Quantum Cryptography = 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers /
by:
(Language materials, printed)
Recent Trends in Decision Science and Management = Proceedings of ICDSM 2019 /
by:
(Language materials, printed)
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
by:
(Language materials, printed)
Advance Metadata Fair = The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia /
by:
(Language materials, printed)
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems = A Decision and Game Theoretic Approach /
by:
(Language materials, printed)
Cyber Security: The Lifeline of Information and Communication Technology
by:
(Language materials, printed)
Proceedings of International Ethical Hacking Conference 2019 = eHaCON 2019, Kolkata, India /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2020 = 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Sustainable Logistics and Production in Industry 4.0 = New Opportunities and Challenges /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Computer Vision – ECCV 2020 = 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XIV /
by:
(Language materials, printed)
Fundamentals of Digital Forensics = Theory, Methods, and Real-Life Applications /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I /
by:
(Language materials, printed)
IT-Prüfung, Datenschutzaudit und Kennzahlen für die Sicherheit = Neue Ansätze für die IT-Revision /
by:
(Language materials, printed)
Attribution of Advanced Persistent Threats = How to Identify the Actors Behind Cyber-Espionage /
by:
(Language materials, printed)
Security in Computing and Communications = 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Foundations and Practice of Security = 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Secure Knowledge Management In Artificial Intelligence Era = 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019, Proceedings /
by:
(Language materials, printed)
Data Science and Analytics = 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, Gurugram, India, November 15–16, 2019, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Artificial Intelligence and Machine Learning for Digital Pathology = State-of-the-Art and Future Challenges /
by:
(Language materials, printed)
Geprüfte Schutz- und Sicherheitskraft (IHK) = Lehrbuch für Prüfung und Praxis /
by:
(Language materials, printed)
CompTIA Security+ Certification Study Guide = Network Security Essentials /
by:
(Language materials, printed)
Advances in Enterprise Engineering XIII = 9th Enterprise Engineering Working Conference, EEWC 2019, Lisbon, Portugal, May 20–24, 2019, Revised Papers /
by:
(Language materials, printed)
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings /
by:
(Language materials, printed)
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Blockchain – ICBC 2020 = Third International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Datensicherheit = Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität /
by:
(Language materials, printed)
Kommentierte Gesetzessammlung Sachkunde nach § 34a und Geprüfte Schutz- und Sicherheitskraft = Alle einschlägigen Gesetze und Vorschriften inklusive der DGUV Vorschriften 1 und 23 /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, Proceedings /
by:
(Language materials, printed)
Privacy in Statistical Databases = UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23–25, 2020, Proceedings /
by:
(Language materials, printed)
Security and Trust Management = 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings /
by:
(Language materials, printed)
Cloud Computing – CLOUD 2020 = 13th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Web Services – ICWS 2020 = 27th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18–20, 2020, Proceedings /
by:
(Language materials, printed)
Information Security = 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings /
by:
(Language materials, printed)
Security Standardisation Research = 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings /
by:
(Language materials, printed)
Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges = ICBCC 2019, UMKC, Kansas City, USA /
by:
(Language materials, printed)
Malware Analysis and Detection Engineering = A Comprehensive Approach to Detect and Analyze Modern Malware /
by:
(Language materials, printed)
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation = 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Database Systems for Advanced Applications = 25th International Conference, DASFAA 2020, Jeju, South Korea, September 24–27, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Multimedia Communications, Services and Security = 10th International Conference, MCSS 2020, Kraków, Poland, October 8-9, 2020, Proceedings /
by:
(Language materials, printed)
Electronic Voting = 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020, Proceedings /
by:
(Language materials, printed)
Automotive Cyber Security = Introduction, Challenges, and Standardization /
by:
(Language materials, printed)
Enterprise Applications, Markets and Services in the Finance Industry = 10th International Workshop, FinanceCom 2020, Helsinki, Finland, August 18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Social Networks and Big Data = 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings /
by:
(Language materials, printed)
Persönlichkeitsschutz in Social Networks = Technische Unterstützung eines grundrechtskonformen Angebots von Social Networks /
by:
(Language materials, printed)
Information and Communications Security = 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings /
by:
(Language materials, printed)
Algorithms and Architectures for Parallel Processing = 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Business Process Management: Blockchain and Robotic Process Automation Forum = BPM 2020 Blockchain and RPA Forum, Seville, Spain, September 13–18, 2020, Proceedings /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12–13, 2020, Proceedings /
by:
(Language materials, printed)
Computer Vision – ECCV 2020 = 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XXIX /
by:
(Language materials, printed)
Emerging Technologies for Authorization and Authentication = Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings /
by:
(Language materials, printed)
Social, Cultural, and Behavioral Modeling = 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18–21, 2020, Proceedings /
by:
(Language materials, printed)
Patientenorientierte Digitalisierung im Krankenhaus = IT-Architekturmanagement am Behandlungspfad /
by:
(Language materials, printed)
Applied Cryptography and Network Security Workshops = ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings /
by:
(Language materials, printed)
Privacy Technologies and Policy = 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22–23, 2020, Proceedings /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2020 = 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2020 = 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Deployable Machine Learning for Security Defense = First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
by:
(Language materials, printed)
Linking Sensitive Data = Methods and Techniques for Practical Privacy-Preserving Information Sharing /
by:
(Language materials, printed)
Chatbots = Aufbau und Anwendungsmöglichkeiten von autonomen Sprachassistenten /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2020 = 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Information Systems Security = 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2020 = 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings /
by:
(Language materials, printed)
Cryptology and Network Security = 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings /
by:
(Language materials, printed)
Information Security Applications = 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26–28, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Theory of Cryptography = 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Theory of Cryptography = 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Critical Infrastructure Protection XIV = 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Theory of Cryptography = 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Computer Security = ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Redesigning Wiretapping = The Digitization of Communications Interception /
by:
(Language materials, printed)
Decision and Game Theory for Security = 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings /
by:
(Language materials, printed)
Manipulationssichere Cloud-Infrastrukturen = Nachhaltige Digitalisierung durch Sealed Cloud Security /
by:
(Language materials, printed)
Machine Learning for Cyber Security = Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Computer Security = ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Data Privacy Management, Cryptocurrencies and Blockchain Technology = ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Trends in Computational Intelligence, Security and Internet of Things = Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings /
by:
(Language materials, printed)
Computational Data and Social Networks = 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11–13, 2020, Proceedings /
by:
(Language materials, printed)
Digital Risk Governance = Security Strategies for the Public and Private Sectors /
by:
(Language materials, printed)
Basiswissen Energieinformatik = Ein Lehr- und Arbeitsbuch für Studierende und Anwender /
by:
(Language materials, printed)
Business Process Management Workshops = BPM 2020 International Workshops, Seville, Spain, September 13–18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Cyber Security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Cyber defence in the age of AI, smart societies and augmented humanity /
by:
(Language materials, printed)
Security engineering : = a guide to building dependable distributed systems /
by:
(Language materials, printed)
Implementation of SR Flip-Flop Based PUF on FPGA for Hardware Security.
by:
(Language materials, printed)
Improving information security practices through computational intelligence
by:
(Language materials, printed)
New methods and tools for intelligent data processing and information security systems
by:
(Language materials, printed)
Tribe of hackers, security leaders = tribal knowledge from the best in cybersecurity leadership /
by:
(Language materials, printed)
Data breach preparation and response = breaches are certain, impact is not /
by:
(Language materials, printed)
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
by:
(Language materials, printed)
Computer Vision and Image Processing = 5th International Conference, CVIP 2020, Prayagraj, India, December 4-6, 2020, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Mobile Web and Intelligent Information Systems = 17th International Conference, MobiWIS 2021, Virtual Event, August 23–25, 2021, Proceedings /
by:
(Language materials, printed)
Splunk Certified Study Guide = Prepare for the User, Power User, and Enterprise Admin Certifications /
by:
(Language materials, printed)
Foundations and Practice of Security = 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Business Process Management: Blockchain and Robotic Process Automation Forum = BPM 2021 Blockchain and RPA Forum, Rome, Italy, September 6–10, 2021, Proceedings /
by:
(Language materials, printed)
Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch = 250 Fragen mit Antworten und 10 Übungsfälle mit Lösungen /
by:
(Language materials, printed)
International Symposium on Mathematics, Quantum Theory, and Cryptography = Proceedings of MQC 2019 /
by:
(Language materials, printed)
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
by:
(Language materials, printed)
IT-Sicherheit für TCP/IP- und IoT-Netzwerke = Grundlagen, Konzepte, Protokolle, Härtung /
by:
(Language materials, printed)
Advances in Security, Networks, and Internet of Things = Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
by:
(Language materials, printed)
Cyberspace Safety and Security = 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
by:
(Language materials, printed)
Human Aspects of Information Security and Assurance = 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 40th International Conference, SAFECOMP 2021, York, UK, September 8–10, 2021, Proceedings /
by:
(Language materials, printed)
Advances in Computer, Communication and Computational Sciences = Proceedings of IC4S 2019 /
by:
(Language materials, printed)
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography = Efficient Modular Exponential Techniques /
by:
(Language materials, printed)
HCI for Cybersecurity, Privacy and Trust = Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings /
by:
(Language materials, printed)
Post-Quantum Cryptography = 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops = DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings /
by:
(Language materials, printed)
Certified Ethical Hacker (CEH) Preparation Guide = Lesson-Based Review of Ethical Hacking and Penetration Testing /
by:
(Language materials, printed)
Azure Security Handbook = A Comprehensive Guide for Defending Your Enterprise Environment /
by:
(Language materials, printed)
Smart Log Data Analytics = Techniques for Advanced Security Analysis /
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021), Volume 1 /
by:
(Language materials, printed)
A Complete Guide to Burp Suite = Learn to Detect Application Vulnerabilities /
by:
(Language materials, printed)
IT und IT-Sicherheit in Begriffen und Zusammenhängen = Thematisch sortiertes Lexikon mit alphabetischem Register zum Nachschlagen /
by:
(Language materials, printed)
Well Packed – Not a Bit Too Much = Compression of Digital Data Explained in an Understandable Way /
by:
(Language materials, printed)
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)
by:
(Language materials, printed)
Innovative Data Communication Technologies and Application = Proceedings of ICIDCA 2020 /
by:
(Language materials, printed)
Selected Areas in Cryptography = 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Information Security and Cryptology = 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Cyber Security, Artificial Intelligence, Data Protection & the Law
by:
(Language materials, printed)
Advances in Information and Computer Security = 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings /
by:
(Language materials, printed)
Intelligent Technologies and Applications = Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings /
by:
(Language materials, printed)
Kommentierte Gesetzessammlung Sachkunde nach § 34a und Geprüfte Schutz- und Sicherheitskraft = Alle einschlägigen Gesetze und Vorschriften inklusive der DGUV Vorschriften 1 und 23 /
by:
(Language materials, printed)
Cross-Cultural Design. Experience and Product Design Across Cultures = 13th International Conference, CCD 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Cryptography and Cryptanalysis in MATLAB = Creating and Programming Advanced Algorithms /
by:
(Language materials, printed)
Information and Communications Security = 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Information and Communications Security = 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Data Science and Intelligent Applications = Proceedings of ICDSIA 2020 /
by:
(Language materials, printed)
Red Hat and IT Security = With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing /
by:
(Language materials, printed)
Privacy and Identity Management = 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Smart Grid Technology = Select Proceedings of PECCON 2019—Volume II /
by:
(Language materials, printed)
Applied Cryptography and Network Security Workshops = ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings /
by:
(Language materials, printed)
Proceedings of International Conference on Smart Computing and Cyber Security = Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) /
by:
(Language materials, printed)
Evolving Technologies for Computing, Communication and Smart World = Proceedings of ETCCS 2020 /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 18th International Conference, TrustBus 2021, Virtual Event, September 27–30, 2021, Proceedings /
by:
(Language materials, printed)
Rising Threats in Expert Applications and Solutions = Proceedings of FICR-TEAS 2020 /
by:
(Language materials, printed)
Silicon Valley Cybersecurity Conference = First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Side-Channel Analysis of Embedded Systems = An Efficient Algorithmic Approach /
by:
(Language materials, printed)
Data Governance and Data Management = Contextualizing Data Governance Drivers, Technologies, and Tools /
by:
(Language materials, printed)
Set Up and Manage Your Virtual Private Server = Making System Administration Accessible to Professionals /
by:
(Language materials, printed)
Information Science and Applications = Proceedings of ICISA 2020 /
by:
(Language materials, printed)
Data Driven Approach Towards Disruptive Technologies = Proceedings of MIDAS 2020 /
by:
(Language materials, printed)
Digital Fluency = Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation /
by:
(Language materials, printed)
Protective Security = Creating Military-Grade Defenses for Your Digital Business /
by:
(Language materials, printed)
Authentication and Access Control = Practical Cryptography Methods and Tools /
by:
(Language materials, printed)
Blockchain for 5G-Enabled IoT = The new wave for Industrial Automation /
by:
(Language materials, printed)
Edge Computing and IoT: Systems, Management and Security = First EAI International Conference, ICECI 2020, Virtual Event, November 6, 2020, Proceedings /
by:
(Language materials, printed)
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems = The Fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) /
by:
(Language materials, printed)
Modern Cryptography = Applied Mathematics for Encryption and Information Security /
by:
(Language materials, printed)
Italian Philosophy of Technology = Socio-Cultural, Legal, Scientific and Aesthetic Perspectives on Technology /
by:
(Language materials, printed)
Towards Sustainable Artificial Intelligence = A Framework to Create Value and Understand Risk /
by:
(Language materials, printed)
Datenschutz nach DS-GVO und Informationssicherheit gewährleisten = Eine kompakte Praxishilfe zur Maßnahmenauswahl: Prozess ZAWAS 4.0 /
by:
(Language materials, printed)
Smart Systems for E-Health = WBAN Technologies, Security and Applications /
by:
(Language materials, printed)
Datenschutz für Softwareentwicklung und IT = Eine praxisorientierte Einführung /
by:
(Language materials, printed)
Building Decentralized Trust = Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers /
by:
(Language materials, printed)
Quantum Cryptography = From Key Distribution to Conference Key Agreement /
by:
(Language materials, printed)
GDPR and Biobanking = Individual Rights, Public Interest and Research Regulation across Europe /
by:
(Language materials, printed)
Understanding Cybersecurity Management in FinTech = Challenges, Strategies, and Trends /
by:
(Language materials, printed)
Multimedia Security = Algorithm Development, Analysis and Applications /
by:
(Language materials, printed)
Deployable Machine Learning for Security Defense = Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings /
by:
(Language materials, printed)
Pro Cryptography and Cryptanalysis with C++20 = Creating and Programming Advanced Algorithms /
by:
(Language materials, printed)
The Theory of Hash Functions and Random Oracles = An Approach to Modern Cryptography /
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = 6th International Conference, MSPN 2020, Paris, France, October 28–29, 2020, Revised Selected Papers /
by:
(Language materials, printed)
The CISO’s Next Frontier = AI, Post-Quantum Cryptography and Advanced Security Paradigms /
by:
(Language materials, printed)
Security and Privacy in New Computing Environments = Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
by:
(Language materials, printed)
Blockchain Technology and Application = Third CCF China Blockchain Conference, CBCC 2020, Jinan, China, December 18-20, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Trends in Wireless Communication and Information Security = Proceedings of EWCIS 2020 /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 13th International Conference, SecITC 2020, Bucharest, Romania, November 19–20, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Advances in Cyber Security = Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 11th International Workshop, COSADE 2020, Lugano, Switzerland, April 1–3, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Information Security and Cryptology – ICISC 2020 = 23rd International Conference, Seoul, South Korea, December 2–4, 2020, Proceedings /
by:
(Language materials, printed)
Data Governance and Compliance = Evolving to Our Current High Stakes Environment /
by:
(Language materials, printed)
Security in Computing and Communications = 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Digital Forensics and Watermarking = 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25–27, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Sachkunde im Bewachungsgewerbe (IHK) = Lehrbuch für Prüfung und Praxis /
by:
(Language materials, printed)
Security by Design = Security Engineering informationstechnischer Systeme /
by:
(Language materials, printed)
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
by:
(Language materials, printed)
Public-Key Cryptography – PKC 2021 = 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III /
by:
(Language materials, printed)
Digital Forensic Investigation of Internet of Things (IoT) Devices
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021), Volume 2 /
by:
(Language materials, printed)
Cyber Threat Intelligence = The No-Nonsense Guide for CISOs and Security Managers /
by:
(Language materials, printed)
Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
by:
(Language materials, printed)
Socio-Technical Aspects in Security and Trust = 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV /
by:
(Language materials, printed)
Topics in Cryptology – CT-RSA 2021 = Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17–20, 2021, Proceedings /
by:
(Language materials, printed)
Computer Security – ESORICS 2021 = 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Cybersecurity, Privacy and Freedom Protection in the Connected World = Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 /
by:
(Language materials, printed)
Privacy Technologies and Policy = 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17–18, 2021, Proceedings /
by:
(Language materials, printed)
Blockchain Systems and Communication Networks: From Concepts to Implementation
by:
(Language materials, printed)
Computing Science, Communication and Security = Second International Conference, COMS2 2021, Gujarat, India, February 6–7, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Sicherheitskritische Mensch-Computer-Interaktion = Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement /
by:
(Language materials, printed)
Proceedings of Second International Conference on Computing, Communications, and Cyber-Security = IC4S 2020 /
by:
(Language materials, printed)
Computer Security – ESORICS 2021 = 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Cloud Defense Strategies with Azure Sentinel = Hands-on Threat Hunting in Cloud Logs and Services /
by:
(Language materials, printed)
Internet of Things Security = Architectures and Security Measures /
by:
(Language materials, printed)
Choose Your InfoSec Path = An Interactive Cybersecurity Adventure for Beginners /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Advanced Information Systems Engineering Workshops = CAiSE 2021 International Workshops, Melbourne, VIC, Australia, June 28 – July 2, 2021, Proceedings /
by:
(Language materials, printed)
Beginning Microsoft 365 Collaboration Apps = Working in the Microsoft Cloud /
by:
(Language materials, printed)
Cyber-Physical Security for Critical Infrastructures Protection = First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Intelligent Information Systems = CAiSE Forum 2021, Melbourne, VIC, Australia, June 28 – July 2, 2021, Proceedings /
by:
(Language materials, printed)
Fundamentals of Cryptography = Introducing Mathematical and Algorithmic Foundations /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXXV = 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings /
by:
(Language materials, printed)
Service-Oriented Computing – ICSOC 2020 Workshops = AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security. FC 2021 International Workshops = CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Socio-Technical Aspects in Security and Trust = 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Big Data and Security = Second International Conference, ICBDS 2020, Singapore, Singapore, December 20–22, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Science of Cyber Security = Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Computer Security and the Internet = Tools and Jewels from Malware to Bitcoin /
by:
(Language materials, printed)
Advances in Digital Forensics XVII = 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Information Security and Cryptology = 17th International Conference, Inscrypt 2021, Virtual Event, August 12–14, 2021, Revised Selected Papers /
by:
(Language materials, printed)
The Role of e-Business during the Time of Grand Challenges = 19th Workshop on e-Business, WeB 2020, Virtual Event, December 12, 2020, Revised Selected Papers /
by:
(Language materials, printed)
The CISO’s Transformation = Security Leadership in a High Threat Landscape /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III /
by:
(Language materials, printed)
Cyber Security Cryptography and Machine Learning = 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Information Security Applications = 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021, Proceedings /
by:
(Language materials, printed)
Data Mining and Big Data = 6th International Conference, DMBD 2021, Guangzhou, China, October 20–22, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Introduction to Privacy Enhancing Technologies = A Classification-Based Approach to Understanding PETs /
by:
(Language materials, printed)
Decision and Game Theory for Security = 12th International Conference, GameSec 2021, Virtual Event, October 25–27, 2021, Proceedings /
by:
(Language materials, printed)
E-Business and Telecommunications = 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Mobile Multimedia Communications = 14th EAI International Conference, Mobimedia 2021, Virtual Event, July 23-25, 2021, Proceedings /
by:
(Language materials, printed)
Provable and Practical Security = 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Information Security and Privacy = 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings /
by:
(Language materials, printed)
Theory of Cryptography = 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part III /
by:
(Language materials, printed)
Theory of Cryptography = 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Security and Privacy = Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings /
by:
(Language materials, printed)
Quantum Algorithms for Cryptographically Significant Boolean Functions = An IBMQ Experience /
by:
(Language materials, printed)
Secure IT Systems = 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings /
by:
(Language materials, printed)
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications = 8th International Conference, FDSE 2021, Virtual Event, November 24–26, 2021, Proceedings /
by:
(Language materials, printed)
Quality, Reliability, Security and Robustness in Heterogeneous Systems = 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings /
by:
(Language materials, printed)
Protocols, Strands, and Logic = Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
by:
(Language materials, printed)
Challenges in the IoT and Smart Environments = A Practitioners' Guide to Security, Ethics and Criminal Threats /
by:
(Language materials, printed)
Information Security = 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings /
by:
(Language materials, printed)
Artificial Intelligence in Cyber Security: Impact and Implications = Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges /
by:
(Language materials, printed)
Computer Architecture and Organization = Fundamentals and Architecture Security /
by:
(Language materials, printed)
Geprüfte Schutz- und Sicherheitskraft (IHK) = Lehrbuch für Prüfung und Praxis /
by:
(Language materials, printed)
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Cryptology – ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part IV /
by:
(Language materials, printed)
Blockchain and Trustworthy Systems = Third International Conference, BlockSys 2021, Guangzhou, China, August 5–6, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Cyber Security = Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Security and Trust Management = 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2021 = 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings /
by:
(Language materials, printed)
Data Governance Success = Growing and Sustaining Data Governance /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I /
by:
(Language materials, printed)
Information Systems Security = 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings /
by:
(Language materials, printed)
Information Security Practice and Experience = 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings /
by:
(Language materials, printed)
Critical Information Infrastructures Security = 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Cyber security and supply chain management : = risks, challenges, and solutions /
by:
(Language materials, printed)
Strategy, leadership, and AI in the cyber ecosystem = the role of digital societies in information governance and decision making /
by:
(Language materials, printed)
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
by:
(Language materials, printed)
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
by:
(Language materials, printed)
Safety and Security of Cyber-Physical Systems = Engineering dependable Software using Principle-based Development /
by:
(Language materials, printed)
IT Security Controls = A Guide to Corporate Standards and Frameworks /
by:
(Language materials, printed)
Information Systems = 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8–9, 2021, Proceedings /
by:
(Language materials, printed)
Security and resilience in intelligent data-centric systems and communication networks
by:
(Language materials, printed)
You can stop stupid = stopping losses from accidental and malicious actions /
by:
(Language materials, printed)
Intelligent security systems = how artificial intelligence, machine learning and data science work for and against computer security /
by:
(Language materials, printed)
Cybersecurity and decision makers = data security and digital trust /
by:
(Language materials, printed)
Digital watermarking and steganography : = fundamentals and techniques /
by:
(Language materials, printed)
Fundamentals of information security = a complete go-to guide for beginners to understand all the aspects of information security /
by:
(Language materials, printed)
Modern cybersecurity strategies for enterprises = protect and secure your enterprise networks, digital business assets, and endpoint security with tested and proven methods /
by:
(Language materials, printed)
Learn computer forensics : = your one-stop guide to searching, analyzing, acquiring, and securing digital evidence /
by:
(Language materials, printed)
Blockchain and artificial intelligence-based solution to enhance the privacy in digital identity and IoT /
by:
(Language materials, printed)
Artificial intelligence in cyber-physical systems : = principles and applications /
by:
(Language materials, printed)
Safety in the digital age = sociotechnical perspectives on algorithms and machine learning /
by:
(Language materials, printed)
Applications for artificial intelligence and digital forensics in national security
by:
(Language materials, printed)
Artificial intelligence in cyber security = theories and applications /
by:
(Language materials, printed)
24 deadly sins of software security = programming flaws and how to fix them /
by:
(Language materials, printed)
Applied Oracle security = developing secure database and middleware environments /
by:
(Language materials, printed)
Hacking exposed malware & rootkits = malware & rootkits security secrets & solutions /
by:
(Language materials, printed)
Future data and security engineering = big data, security and privacy, smart city and industry 4.0 applications : 10th International Conference, FDSE 2023, Da Nang, Vietnam, November 22-24, 2023 : proceedings /
by:
(Language materials, printed)
Discovering cybersecurity = a technical introduction for the absolute beginner /
by:
(Language materials, printed)
Adversarial machine learning = attack surfaces, defence mechanisms, learning theories in artificial intelligence /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things /
by:
(Language materials, printed)
Tactical Wireshark = a deep dive into intrusion analysis, malware incidents, and extraction of forensic evidence /
by:
(Language materials, printed)
DevSecOps adventures = a game-changing approach with Chocolate, LEGO, and coaching games /
by:
(Language materials, printed)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 11 /
by:
(Language materials, printed)
Understanding cybersecurity management in healthcare = challenges, strategies and trends /
by:
(Language materials, printed)
Digital shakedown = the complete guide to understanding and combating ransomware /
by:
(Language materials, printed)
The internet in everything = freedom and security in a world with no off switch /
by:
(Language materials, printed)
Global cyber security labor shortage and international business risk
by:
(Language materials, printed)
Ai-based digital health communication for securing assistive systems
by:
(Language materials, printed)
Strengthening industrial cybersecurity to protect business intelligence
by:
(Language materials, printed)
x86 software reverse-engineering, cracking, and counter-measures /
by:
(Language materials, printed)
Navigating uncertainty using foresight intelligence = a guidebook for scoping scenario options in cyber and beyond /
by:
(Language materials, printed)
Boardroom cybersecurity = a director's guide to mastering cybersecurity fundamentals /
by:
(Language materials, printed)
Information security incident and data breach management = a step-by-step approach /
by:
(Language materials, printed)
Cyber resilience system engineering empowered by endogenous security and safety
by:
(Language materials, printed)
Frontiers in hardware security and trust : = theory, design and practice /
by:
(Language materials, printed)
Machine Learning for Detection of Cyberattacks on Industrial Control Systems.
by:
(Language materials, manuscript)
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
by:
(Language materials, manuscript)
Enhancing Cybersecurity of Unmanned Aircraft Systems in Urban Environments.
by:
(Language materials, manuscript)
Show more
Fewer
Subjects