Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 24
- Computer software 8
- Cryptography 6
- Information technology 4
- Reliability 4
- Software engineering 4
- Verification 4
- Algebra, Boolean 2
- Coding theory 2
- Computer logic 2
- Data encryption (Computer science) 2
- Data integrity 2
- Data protection 2
- Mathematical models 2
- Number theory 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Safety measures 2
- Security measures 2
- Software protection 2
- System safety 2
- System theory 2
- Systems software 2
-
1
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Software system reliability and security
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Software system reliability and security
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
13
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
14
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Published 2005Subjects: “…Public key infrastructure (Computer security) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
16
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
18
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Published 2005Subjects: “…Public key infrastructure (Computer security) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
19
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
20
Software systems safety /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook