Search Results facets
Fewer
Personal Author
(5)
(3)
(3)
(3)
(3)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
More
Topic Subject
(256)
(201)
(196)
(134)
Fewer
Series Title
(3)
(1)
Search Results List
0
selected titles
Reached limit!
Clear basket
Search result number | Book jacket cover art | Item details and Actions | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
31. |
|
Cooperative Communications and Networking Technologies and System Design
![]()
|
||||||||||
32. |
|
Critical Infrastructure Protection IV Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers
![]()
|
||||||||||
33. |
|
Critical Infrastructure Protection III Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
![]()
|
||||||||||
34. |
|
Critical Infrastructure Protection II
![]()
|
||||||||||
35. |
|
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
![]()
|
||||||||||
36. |
|
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
![]()
|
||||||||||
37. |
|
Decrypted Secrets Methods and Maxims of Cryptology
![]()
|
||||||||||
38. |
|
Advances in Information Processing and Protection
![]()
|
||||||||||
39. |
|
Managing Information Systems Security and Privacy
![]()
|
||||||||||
40. |
|
Introduction to Cryptography Principles and Applications
![]()
|