|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Formal Aspects of Component Software
|
Farhad Arbab |
<p>This book constitutes revised selected papers of the 8th International Workshop on Formal Aspects of Component Software, FACS 2011, held in Oslo, Norway in September 2011. </p><p>The 18 full paper… |
OL19850807W |
|
Foundations and Practice of Security
|
Joaquin Garcia-Alfaro |
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October… |
OL19851042W |
|
Information Security Practice and Experience
|
Robert H. Deng |
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised ful… |
OL19857516W |
|
Information Security Applications
|
Dong Hoon Lee |
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.… |
OL19857525W |
|
Perspectives on the Future of Software Engineering
|
Jürgen Münch |
The dependence on quality software in all areas of life is what makes software engineering a key discipline for today’s society. Thus, over the last few decades it has been increasingly recognized th… |
OL19894154W |
|
Secure IT Systems
|
Audun Jøsang |
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully revi… |
OL19901254W |
|
Security and Privacy in Communication Networks
|
Angelos D. Keromytis |
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The… |
OL19901284W |
|
Security and Trust Management
|
Audun Jøsang |
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in con… |
OL19901295W |
|
Smart Grid Security
|
Jorge Cuellar |
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirement… |
OL19902432W |
|
Transactions on Pattern Languages of Programming III
|
James Noble |
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the… |
OL19907685W |