Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 16
- Computer software 4
- Security measures 4
- Cryptography 3
- Computer networks 2
- Cyberterrorism 2
- Data protection 2
- Information technology 2
- Prevention 2
- Reliability 2
- Software engineering 2
- Verification 2
- Algebra, Boolean 1
- Coding theory 1
- Computer logic 1
- Data encryption (Computer science) 1
- Data integrity 1
- Embedded computer systems 1
- Information networks 1
- Information warfare 1
- Mathematical models 1
- Number theory 1
- Public key cryptography 1
- Public key infrastructure (Computer security) 1
- Safety measures 1
- Software protection 1
- System safety 1
- System theory 1
- Systems software 1
-
1
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Software system reliability and security
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Security and embedded systems
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Published 2005Subjects: “…Public key infrastructure (Computer security) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
13
Software systems safety /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Software and systems safety specification and verification /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
16
Verification of infinite-state systems with applications to security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook