Book titles in this series
-
-
Preserving Privacy in Data Outsourcing
- Authors:
-
- Sara Foresti
- Copyright: 2011
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Spyware and Adware
- Authors:
-
- John Aycock
- Copyright: 2011
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Adaptive Cryptographic Access Control
- Authors:
-
- Anne V. D. M. Kayem
- Selim G. Akl
- Patrick Martin
- Copyright: 2010
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Insider Threats in Cyber Security
- Editors:
-
- Christian W. Probst
- Jeffrey Hunker
- Dieter Gollmann
- Matt Bishop
- Copyright: 2010
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Cyber Situational Awareness
Issues and Research
- Editors:
-
- Sushil Jajodia
- Peng Liu
- Vipin Swarup
- Cliff Wang
- Copyright: 2010
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Network Intrusion Detection and Prevention
Concepts and Techniques
- Authors:
-
- Ali A. Ghorbani
- Wei Lu
- Mahbod Tavallaee
- Copyright: 2010
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Economics of Information Security
- Editors:
-
- L. Jean Camp
- Stephen Lewis
- Copyright: 2004
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Quality Of Protection
Security Measurements and Metrics
- Editors:
-
- Dieter Gollmann
- Fabio MASSACCI
- Artsiom Yautsiukhin
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Secure Multi-Party Non-Repudiation Protocols and Applications
- Authors:
-
- José A. Onieva
- Jianying Zhou
- Copyright: 2009
Available Renditions
- Hard cover
- Soft cover
- eBook