نتایج جستجو
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram (ed.), John Viega (ed.), 2009
IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing
Tobias Ackermann (auth.), 2013
Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security
John Mueller, Mark G. Stewart, 2011
Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.), 2012
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Hydrology, Climate Change, and Implications for Water Security Committee on Himalayan Glaciers, Board on Atmospheric Studies and Climate, Division on Earth and Life Studies, National Research Council, 2012
Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings
Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi (auth.), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (eds.), 1998
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.), 2013
Physical and logical security convergence: powered by enterprise security management
Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole, 2007
Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems
Michael Khairallah, 2005
Physical-layer security : from information theory to security engineering
Matthieu Bloch; Joao Barros, 2011
Physical-Layer Security: From Information Theory to Security Engineering
Matthieu Bloch, João Barros, 2011
Physical-Layer Security: From Information Theory to Security Engineering
Matthieu Bloch, João Barros, 2011
