Search Results facets
Search Results List
0
selected titles
Reached limit!
Clear basket
Search result number | Book jacket cover art | Item details and Actions | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
31. |
|
Automated Security Management
E-book
|
||||||||
32. |
|
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
E-book
|
||||||||
33. |
|
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
E-book
|
||||||||
34. |
|
Secure Integrated Circuits and Systems
E-book
|
||||||||
35. |
|
Understanding Cryptography A Textbook for Students and Practitioners
E-book
|
||||||||
36. |
|
Machine Learning and Systems Engineering
E-book
|
||||||||
37. |
|
Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime
E-book
|
||||||||
38. |
|
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
E-book
|
||||||||
39. |
|
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
E-book
|
||||||||
40. |
|
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
E-book
|