Total90items。

11
Architecting critical systems first international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 : proceedings /
  • Author/Creator:edited by Holger Giese.
  • Publishers:Springer-Verlag Berlin Heidelberg
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Computer architecture ; Fault-tolerant computing ; System design ; Computer Science. ; Algorithm Analysis and Problem Complexity. ; Computers and Society. ; Data Encryption. ; Information Systems Applications (incl.Internet) ; Software Engineering. ; Special Purpose and Application-Based Systems.
  • Author/Creator:Giese, Holger.
  • Electronic resouces:resource    ;

12
Arithmetic of finite fields third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
  • Author/Creator:edited by M. Anwar Hasan, Tor Helleseth.
  • Publishers:Springer-Verlag Berlin Heidelberg
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Algebraic fields ; Computer Science. ; Algorithm Analysis and Problem Complexity. ; Computer Communication Networks. ; Data Encryption. ; Data Structures, Cryptology and Information Theory. ; Discrete Mathematics in Computer Science. ; Symbolic and Algebraic Manipulation.
  • Author/Creator:Hasan, M. Anwar. ; Helleseth, Tor.
  • Electronic resouces:resource    ;

13
Blockchain basics : a non-technical introduction in 25 steps /
  • Author/Creator:Daniel Drescher.
  • Publishers:Apress
  • pubyear:c2017.
  • Place of Publication:[Berkeley, California?] :
  • Subject:Blockchains (Databases) ; Data encryption (Computer science) ; Database management. ; Electronic commerce. ; Electronic funds transfers.
  • Author/Creator:Drescher, Daniel,

14
Building SET applications for secure transactions
  • Author/Creator:/ Mark S. Merkow, Jim Breithaup, Ken L. Wheeler.
  • Publishers:: Wiley
  • pubyear:, c1998.
  • Place of Publication:New York
  • Subject:Business enterprises|--Computer networks|--Security measures. ; Data encryption. ; Electronic commerce.
  • Author/Creator:Merkow, Mark S. ; Breithaup, Jim ; Wheeler, Ken L.

15
Communications and multimedia security 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 : proceedings /
  • Author/Creator:edited by Bart de Decker, Ingrid Schaumuller-Bichl.
  • Publishers:IFIP International Federation for Information Processing
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Computer security ; Data protection ; Internet|Security measures ; Multimedia systems|Security measures ; Computer Science. ; Algorithm Analysis and Problem Complexity. ; Computer Communication Networks. ; Computers and Society. ; Data Encryption. ; Management of Computing and Information Systems. ; Operating Systems.
  • Author/Creator:Decker, Bart de. ; Schaumuller-Bichl, Ingrid.
  • Electronic resouces:resource    ;

16
Critical information infrastructures security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 : revised papers /
  • Author/Creator:edited by Erich Rome, Robin Bloomfield.
  • Publishers:Springer-Verlag Berlin Heidelberg
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Computer security ; Information networks|Access control ; Data protection ; Computer Science. ; Performance and Reliability. ; Computer Communication Networks. ; Management of Computing and Information Systems. ; Data Encryption. ; Special Purpose and Application-Based Systems. ; System Performance and Evaluation.
  • Author/Creator:Rome, Erich. ; Bloomfield, Robin.
  • Electronic resouces:resource

17
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications/

18
Data and applications security and privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
  • Author/Creator:edited by Sara Foresti, Sushil Jajodia.
  • Publishers:IFIP International Federation for Information Processing
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Computer security ; Data protection ; Computer Science. ; Computer Communication Networks. ; Data Encryption. ; Management of Computing and Information Systems. ; Information Systems Applications (incl.Internet) ; Algorithm Analysis and Problem Complexity. ; Information Storage and Retrieval.
  • Author/Creator:Foresti, Sara. ; Jajodia, Sushil.
  • Electronic resouces:resource

19
Data privacy management and autonomous spontaneous security 4th international workshop, DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 : revised selected papers /
  • Author/Creator:edited by Joaquin Garcia-Alfaro ... [et al.].
  • Publishers:Springer-Verlag Berlin Heidelberg
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Autonomic computing ; Computer security ; Internet|Security measures ; Computer Science. ; Computer Communication Networks. ; Computers and Society. ; Data Encryption. ; Legal Aspects of Computing. ; Management of Computing and Information Systems. ; Systems and Data Security.
  • Author/Creator:Garcia-Alfaro, Joaquin.
  • Electronic resouces:resource

20
Detection of intrusions and malware, and vulnerability assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /
  • Author/Creator:edited by Christian Kreibich, Marko Jahnke.
  • Publishers:Springer-Verlag Berlin Heidelberg
  • pubyear:2010.
  • Place of Publication:Berlin, Heidelberg :
  • Subject:Computer networks|Security measures ; Computer networks|Access control ; Computer Science. ; Computer Communication Networks. ; Management of Computing and Information Systems. ; Data Encryption. ; Computers and Society. ; Information Systems Applications (incl.Internet) ; Algorithm Analysis and Problem Complexity.
  • Author/Creator:Kreibich, Christian. ; Jahnke, Marko.
  • Electronic resouces:resource