-
1
-
2Published 1999Table of Contents: “…Risk Management -- Developing Electronic Trust Policies Using a Risk Management Model -- Security…”
Full Text via HEAL-Link
Electronic eBook -
3by Chen, HsinchunTable of Contents: “…Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research…”
Published 2006
Full Text via HEAL-Link
Electronic eBook -
4Intelligence and Security Informatics for International Security Information Sharing and Data Miningby Chen, HsinchunGet full text
Published 2006
Electronic Kit Book -
5by Lincke, SusanTable of Contents: “…Preface -- Security Awareness -- Combatting Fraud -- Complying with Security Regulation…”
Published 2015
Full Text via HEAL-Link
Electronic eBook -
6
-
7by Liska, AllanTable of Contents: “…Chapter 1. Understanding NTP -- Chapter 2. Issues in NTP Security -- Chapter 3. Vulnerabilities…”
Published 2016
Full Text via HEAL-Link
Electronic eBook -
8Published 2016Table of Contents: “…Permissions and trust evaluation, implementation and management -- Cloud and device security…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2016Table of Contents: “…Security -- System Security -- Network Security -- Software Security -- Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
10Table of Contents: “…General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2004Table of Contents: “… Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2004Table of Contents: “… -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2003Table of Contents: “…Invited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data…”
Full Text via HEAL-Link
Electronic eBook -
14Published 1999Table of Contents: “… -- External Consistency and the Verification of Security Protocols -- External Consistency…”
Full Text via HEAL-Link
Electronic eBook -
15Table of Contents: “…Privacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2000Table of Contents: “… in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key…”
Full Text via HEAL-Link
Electronic eBook -
17Published 1998Table of Contents: “… -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2002Table of Contents: “… Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2002Table of Contents: “…Biometrics -- Biometric Authentication in Infrastructure Security -- Denial of Access in Biometrics…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2016Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
Full Text via HEAL-Link
Electronic eBook