Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 30
- Computer software 6
- Cryptography 6
- Data protection 6
- Information technology 4
- Information warfare 4
- Security measures 4
- Verification 4
- Algebra, Boolean 2
- Coding theory 2
- Computer logic 2
- Data encryption (Computer science) 2
- Data integrity 2
- Embedded computer systems 2
- Mathematical models 2
- Number theory 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Reliability 2
- Software engineering 2
- Software protection 2
- System safety 2
- System theory 2
-
1
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 Jul...
Published 2012Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 Jul...
Published 2012Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
13
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
14
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
16
Software safety and security tools for analysis and verification /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
18
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
19
Security and embedded systems
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
20
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook