Showing 1 - 20 results of 34 for search '"Computer security"', query time: 0.04s Refine Results
  1. 1

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  2. 2

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  3. 3

    Formal logical methods for system security and correctness

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  4. 4

    Secure telematic applications for national scale projects

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  5. 5
  6. 6
  7. 7

    Formal logical methods for system security and correctness

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  8. 8

    Secure telematic applications for national scale projects

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  9. 9

    Software system reliability and security

    Published 2007
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Software safety and security tools for analysis and verification /

    Published 2012
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  11. 11

    Software safety and security tools for analysis and verification /

    Published 2012
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  12. 12

    Software system reliability and security

    Published 2007
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Boolean functions in cryptology and information security

    Published 2008
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  14. 14

    Boolean functions in cryptology and information security

    Published 2008
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  15. 15

    Security and embedded systems

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  16. 16

    Identity, security and democracy the wider social and ethical implications of automated systems for human identification /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  17. 17

    Security and embedded systems

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  18. 18

    Identity, security and democracy the wider social and ethical implications of automated systems for human identification /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  19. 19

    Applied public key infrastructure 4th International Workshop : IWAP 2005 /

    Published 2005
    Subjects: “…Public key infrastructure (Computer security) Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  20. 20

    Modelling cyber security approaches, methodology, strategies /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook