Catalog
Home
(current)
About
Tutorials
Electronic Resources
New Titles
Institutional Repository
My Account
Basic Search
Browse the Catalog
Advanced Search
0
Records In Basket
View Basket
Place Holds
Print Title Details
Email Title Details
Add Basket to Saved List
Clear Basket
Search Results
Catalog Search
Search:
Type:
Keyword
Title
Journal Title
Author
Subject
Series
Format:
All Formats
All Books
All Music
All Videos
Audiocassette music recording
Blu-ray
Braille
Cassette audiobook
CD Audiobook
CD Music recording
DVD
E-audio
E-book
E-video
Equipment, games, toys
Kit
Large Print Book
Map
Microform
Music Score
Phonograph music recording
Phonograph spoken recording
Picture
Preloaded Audio
Serials and magazines
Software and video games
VHS
Library:
IPICYT
Biblioteca
Biblioteca Ipicyt
Search
[
2 filters applied
]
Additional search filters and navigation
Refine these results
Back to results
Sort Results
Sort by Relevance
Title: A to Z
Title: Z to A
Author: A to Z
Author: Z to A
Date: Newest to Oldest
Date: Oldest to Newest
Most Popular
Popularity Adjusted Relevance
Show More Details
Disable Highlighting
Limit to Available Items
Group By Formats and Editions
Show Results from All Libraries
Exclude Electronic Resources
◄
Previous
8
9
10
11
12
Next
►
Results
111
-
120
of
608
(page
12
of
61
)
Personal Author
Meersman, Robert
(9)
Shi, Yun Q.
(8)
Chen, Liqun
(7)
Bao, Feng
(5)
More
Topic Subject
Data protection
(608)
Systems and Data Security
(608)
Computer science
(590)
Computer Science
(587)
More
Series Title
SpringerBriefs in Computer Science
(19)
SpringerBriefs in Electrical and Computer Engineering
(3)
Advanced Information and Knowledge Processing
(2)
Information Security and Cryptography, Texts and Monographs
(2)
More
Select 111 - 120
0
selected
Reached limit!
Clear basket
111
Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
E-book (2007.)
Gorodetsky, Vladimir.
Add to basket
Remove from basket
112
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
E-book (2013.)
Sadeghi, Ahmad-Reza.
Add to basket
Remove from basket
113
Transparent User Authentication Biometrics, RFID and Behavioural Profiling
E-book (2011.)
Clarke, Nathan.
Add to basket
Remove from basket
114
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
E-book (2009.)
Flegel, Ulrich.
Add to basket
Remove from basket
115
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
E-book (2008.)
Zamboni, Diego.
Add to basket
Remove from basket
116
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
E-book (2007.)
Hämmerli, Bernhard.
Add to basket
Remove from basket
117
Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings
E-book (2008.)
Grimaud, Gilles.
Add to basket
Remove from basket
118
Android Malware
E-book (2013.)
Jiang, Xuxian.
Add to basket
Remove from basket
119
Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
E-book (2012.)
Lei, Jingsheng.
Add to basket
Remove from basket
120
Applied Information Security A Hands-on Approach
E-book (2011.)
Basin, David.
Add to basket
Remove from basket
Search Results Facets
Search Results List
Personal Author
Meersman, Robert
(9)
Shi, Yun Q.
(8)
Chen, Liqun
(7)
Bao, Feng
(5)
More
Topic Subject
Data protection
(608)
Systems and Data Security
(608)
Computer science
(590)
Computer Science
(587)
More
Series Title
SpringerBriefs in Computer Science
(19)
SpringerBriefs in Electrical and Computer Engineering
(3)
Advanced Information and Knowledge Processing
(2)
Information Security and Cryptography, Texts and Monographs
(2)
More
Login To Evergreen
Library Card Number
PIN
Forgot Your Password?
Additional Resources