Data and Applications Security and Privacy XXIV
Lieferbar innerhalb 14 Tagen
Multimedia Database Systems
Computer Security -- ESORICS 2013
Lieferbar innerhalb ca. einer Woche
ICT Systems Security and Privacy Protection
Security and Privacy in Communication Networks
Information Systems Security
Encyclopedia of Cryptography, Security and Privacy
Time Granularities in Databases, Data Mining, and Temporal Reasoning
Adaptive Autonomous Secure Cyber Systems
Herunterladen
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
Privacy in Location-Based Applications
Intrusion Detection in Distributed Systems
Applications of Data Mining in Computer Security
Cyber Situational Awareness
Moving Target Defense
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures
Multilevel Secure Transaction Processing
Advanced Transaction Models and Architectures
Moving Target Defense II
Secure Cloud Computing
Cyber Warfare
Handbook of Database Security
Proceedings of the IFIP TC 11 23rd International Information Security Conference
Preserving Privacy in On-Line Analytical Processing (OLAP)
Trusted Recovery and Defensive Information Warfare
Network Hardening
Integrity and Internal Control in Information Systems VI
Security and Protection in Information Processing Systems