Showing 1 - 16 results of 16 for search '"computer security"', query time: 0.04s Refine Results
  1. 1

    Information assurance and computer security

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  2. 2
  3. 3

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  4. 4

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  5. 5
  6. 6

    Formal logical methods for system security and correctness

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  7. 7

    Secure telematic applications for national scale projects

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  8. 8

    Software safety and security tools for analysis and verification /

    Published 2012
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  9. 9

    Boolean functions in cryptology and information security

    Published 2008
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  10. 10

    Security and embedded systems

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  11. 11

    Identity, security and democracy the wider social and ethical implications of automated systems for human identification /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  12. 12

    Modelling cyber security approaches, methodology, strategies /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  13. 13

    Applied public key infrastructure 4th International Workshop : IWAP 2005 /

    Published 2005
    Subjects: “…Public key infrastructure (Computer security) Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  14. 14
  15. 15

    Software and systems safety specification and verification /

    Published 2011
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  16. 16

    Verification of infinite-state systems with applications to security

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook