Showing 1 - 20 results of 12,976 for search '"security"', query time: 0.11s Refine Results
  1. 1
  2. 2
    Published 1999
    Table of Contents: “…Risk Management -- Developing Electronic Trust Policies Using a Risk Management Model -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    by Chen, Hsinchun
    Published 2006
    Table of Contents: “…Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
  5. 5
    by Lincke, Susan
    Published 2015
    Table of Contents: “…Preface -- Security Awareness -- Combatting Fraud -- Complying with Security Regulation…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2015
    Subjects: “…Computer security.…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    by Liska, Allan
    Published 2016
    Table of Contents: “…Chapter 1. Understanding NTP -- Chapter 2. Issues in NTP Security -- Chapter 3. Vulnerabilities…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2016
    Table of Contents: “…Permissions and trust evaluation, implementation and management -- Cloud and device security…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2016
    Table of Contents: “…Security -- System Security -- Network Security -- Software Security -- Cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Table of Contents: “…General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2004
    Table of Contents: “… Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2004
    Table of Contents: “… -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2003
    Table of Contents: “…Invited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 1999
    Table of Contents: “… -- External Consistency and the Verification of Security Protocols -- External Consistency…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Table of Contents: “…Privacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2000
    Table of Contents: “… in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 1998
    Table of Contents: “… -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2002
    Table of Contents: “… Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2002
    Table of Contents: “…Biometrics -- Biometric Authentication in Infrastructure Security -- Denial of Access in Biometrics…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2016
    Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search