Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 10
- Computer software 8
- Data protection 8
- Computer networks 6
- Cryptography 6
- Reliability 6
- Access control 4
- Computers 4
- Cyberterrorism 4
- Data encryption (Computer science) 4
- Prevention 4
- Software engineering 4
- Verification 4
- Algebra, Boolean 2
- Computer logic 2
- Cyberinfrastructure 2
- Data integrity 2
- Data processing 2
- Electronic information resources 2
- Embedded computer systems 2
- Information networks 2
- Information technology 2
- Languages, Artificial 2
- Management 2
- Mathematical models 2
- Medical informatics 2
- Medical records 2
- Programming languages (Electronic computers) 2
- Safety measures 2
-
1
Analysis, design, and implementation of secure and interoperable distributed health information systems
Published 2002“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Security and embedded systems
Published 2006“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Verification of infinite-state systems with applications to security
Published 2006“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Information assurance and computer security
Published 2006“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Software system reliability and security
Published 2007“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
A process for developing a common vocabulary in the information security area
Published 2007“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Formal logical methods for system security and correctness
Published 2008“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Boolean functions in cryptology and information security
Published 2008“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009“…Ios Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Modelling cyber security approaches, methodology, strategies /
Published 2009“…Ios Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Logics and languages for reliability and security
Published 2010“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Formal models and techniques for analyzing security protocols
Published 2011“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Software and systems safety specification and verification /
Published 2011“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
14
Software safety and security tools for analysis and verification /
Published 2012“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
Secure multi-party computation
Published 2013“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Best practices in computer network defense : incident detection and response /
Published 2014“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published 2015“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Software systems safety /
Published 2014“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published 2015“…IOS Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Modelling cyber security approaches, methodology, strategies /
Published 2009“…Ios Press,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook