Search Results - "Computer security Congresses."
-
1
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Formal logical methods for system security and correctness
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Software system reliability and security
Published 2007Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Software safety and security tools for analysis and verification /
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Software safety and security tools for analysis and verification /
Published 2012Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Software system reliability and security
Published 2007Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Boolean functions in cryptology and information security
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
14
Boolean functions in cryptology and information security
Published 2008Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
Security and embedded systems
Published 2006Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
16
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Security and embedded systems
Published 2006Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
18
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
19
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Published 2005Subjects: “…Public key infrastructure (Computer security) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
20
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook