Explore: Systems And Data Security
Discover books, insights, and more — all in one place.
Learn more about Systems And Data Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “systems-and-data-security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Large-Scale Data Analytics
By Aris Gkoulalas-Divanis and Abderrahim Labbi

“Large-Scale Data Analytics” Metadata:
- Title: Large-Scale Data Analytics
- Authors: Aris Gkoulalas-DivanisAbderrahim Labbi
- Language: English
- Number of Pages: Median: 269
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2014 - 2016
“Large-Scale Data Analytics” Subjects and Themes:
- Subjects: ➤ Management information systems - Database management - Data mining - Computer science - Data protection - Information systems - Information Systems and Communication Service - Business Information Systems - Data Mining and Knowledge Discovery - Systems and Data Security
Edition Identifiers:
- The Open Library ID: OL34377603M - OL35518261M - OL28013982M
- Library of Congress Control Number (LCCN): 2013954541
- All ISBNs: ➤ 9781461492429 - 1461492416 - 9781461492412 - 9781493942251 - 1493942255 - 1461492424
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Large-Scale Data Analytics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2e-Business and Telecommunications
By Mohammad S. Obaidat and Joaquim Filipe

“e-Business and Telecommunications” Metadata:
- Title: ➤ e-Business and Telecommunications
- Authors: Mohammad S. ObaidatJoaquim Filipe
- Language: English
- Number of Pages: Median: 419
- Publisher: ➤ Obaidat Mohammad S - Springer London, Limited - Springer International Publishing AG - Springer - MOXIC
- Publish Date: ➤ 2008 - 2009 - 2011 - 2012 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2022
“e-Business and Telecommunications” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Telecommunication - Telecommunication systems - Computer networks - Congresses - Business - Data processing - Mobile communication systems - Information retrieval - Information organization - Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Data protection - Information storage and retrieval systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL30141071M - OL37311881M - OL34521668M - OL37109616M - OL27962825M - OL34885872M - OL34383445M - OL35591303M - OL34533700M - OL34521702M - OL27965142M - OL27976199M - OL37140489M - OL28114542M - OL37124445M - OL28185892M - OL28127215M - OL28242624M
- Library of Congress Control Number (LCCN): 2012954173
- All ISBNs: ➤ 9783030904272 - 3319259156 - 9783030348656 - 3319302221 - 3540886532 - 9783662447871 - 9783642357541 - 303090427X - 9783540886532 - 3662447908 - 3319678752 - 3030526852 - 9783642200779 - 9783030110383 - 3662447878 - 9783030526856 - 3662447886 - 9783319678757 - 9783662447901 - 3642357547 - 3030348652 - 3662447916 - 9783319259147 - 9783319302218 - 9783662447888 - 3642200788 - 9783319259154 - 364220077X - 9783642200786 - 9783642051975 - 9783662447918 - 3319259148 - 3030110389 - 3642051979 - 3319302213 - 9783319302225
Author's Alternative Names:
"Filipe Joaquim"Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find e-Business and Telecommunications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Security in Computing and Communications
By Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat and Jose M. Alcaraz Calero

“Security in Computing and Communications” Metadata:
- Title: ➤ Security in Computing and Communications
- Authors: Sabu M. ThampiSanjay MadriaGuojun WangDanda B. RawatJose M. Alcaraz Calero
- Language: English
- Number of Pages: Median: 460
- Publisher: ➤ Springer - Lloret Mauri Jaime - Springer Singapore Pte. Limited - Springer London, Limited
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2021
“Security in Computing and Communications” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: ➤ OL36217183M - OL30785909M - OL28961763M - OL28305858M - OL37235873M - OL30321492M - OL28178189M - OL37322457M - OL30195670M - OL30528404M - OL37236356M - OL34541263M - OL28337128M
- All ISBNs: ➤ 366244965X - 3642405762 - 9789811068997 - 9811068992 - 3319229141 - 9783319229140 - 9811548242 - 9789811358258 - 9783319229157 - 9789811027376 - 9789811548260 - 9783642405761 - 3662449668 - 9783662449660 - 9789811548246 - 9811548269 - 9811027390 - 9789811068973 - 9811027374 - 9811068976 - 331922915X - 9789811027390 - 9811604215 - 9783662449653 - 9811358257 - 9789811604218
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in Computing and Communications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Financial Cryptography and Data Security
By Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff

“Financial Cryptography and Data Security” Metadata:
- Title: ➤ Financial Cryptography and Data Security
- Authors: ➤ Jeremy ClarkSarah MeiklejohnPeter Y. A. RyanDan WallachMichael BrennerKurt Rohloff
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2025
“Financial Cryptography and Data Security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (computer science) - Electronic commerce - Computer security - Internet, security measures - Cryptography, data processing - System design - Computer networks, security measures - Internal security - Computer science - Data protection - Information systems - Systems and Data Security - Data Encryption - E-Commerce/e-business - Computer Appl. in Administrative Data Processing
Edition Identifiers:
- The Open Library ID: ➤ OL57532211M - OL28239582M - OL30907132M - OL29728105M - OL34528868M - OL28253524M - OL28249616M - OL28281516M - OL57550244M - OL30358706M - OL30527919M - OL28740778M - OL37229466M - OL28041391M
- All ISBNs: ➤ 3662447738 - 3662583860 - 9783662480502 - 9783662588192 - 3031786750 - 3662480506 - 9783662583869 - 9783642413216 - 364241320X - 9783031786754 - 9783319702773 - 9783662447734 - 3031786785 - 9783662533567 - 3030437248 - 9783030437244 - 9783031786785 - 3662588196 - 3642413196 - 9783319428260 - 3319428268 - 9783642413209 - 3662480514 - 9783642413193 - 3319702777 - 9783662480519 - 3662533561 - 3642413218
Author's Alternative Names:
"Peter Y A Ryan" and "Peter Y.A. Ryan"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Financial Cryptography and Data Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Intelligence and Security Informatics
By Michael Chau

“Intelligence and Security Informatics” Metadata:
- Title: ➤ Intelligence and Security Informatics
- Author: Michael Chau
- Language: English
- Number of Pages: Median: 144
- Publisher: ➤ Springer Berlin Heidelberg - Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2013 - 2014 - 2015 - 2016 - 2017
- Publish Location: Berlin, Heidelberg
“Intelligence and Security Informatics” Subjects and Themes:
- Subjects: ➤ Computers - Data Mining and Knowledge Discovery - Computers and Society - Computer networks - Law and legislation - Information Systems - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Data mining - Legal Aspects of Computing - Computer security - Computer networks, security measures - Expert systems (computer science) - National security - Information retrieval - Information organization - Computer Communication Networks - Data protection - Information storage and retrieval systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL27046085M - OL29610282M - OL37229394M - OL28155630M - OL37229176M - OL34376973M - OL28735827M - OL34536888M - OL34520875M - OL28160491M - OL29366182M - OL28167799M
- All ISBNs: ➤ 3319184555 - 9783642396922 - 9783642304286 - 3319066765 - 3642304281 - 9783319574622 - 3319066773 - 3319318624 - 9783319184555 - 3319184547 - 3642220401 - 9783319066769 - 3642396925 - 3642396933 - 9783319066776 - 9783642220401 - 9783319318639 - 9783319318622 - 3319574620 - 9783642304293 - 9783642396939 - 3319318632 - 364230429X - 9783319184548
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intelligence and Security Informatics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Modeling Decisions for Artificial Intelligence
By Vicenç Torra

“Modeling Decisions for Artificial Intelligence” Metadata:
- Title: ➤ Modeling Decisions for Artificial Intelligence
- Author: Vicenç Torra
- Language: English
- Number of Pages: Median: 333
- Publisher: ➤ Springer Berlin Heidelberg - Springer International Publishing AG - Imprint: Springer - Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - 2021 - 2022 - 2023
- Publish Location: Berlin, Heidelberg
“Modeling Decisions for Artificial Intelligence” Subjects and Themes:
- Subjects: ➤ Pattern perception - Data Mining and Knowledge Discovery - Systems and Data Security - Information organization - Optical pattern recognition - Electronic data processing - Data protection - Information retrieval - Computer science - Information storage and retrieval systems - Data mining - Numeric Computing - Artificial intelligence - Artificial Intelligence (incl. Robotics) - Congresses - Mathematical models - Decision making, mathematical models - Computer simulation - Decision making
Edition Identifiers:
- The Open Library ID: ➤ OL28006188M - OL27075357M - OL28224697M - OL27983824M - OL34887960M - OL28248591M - OL39267977M - OL37313204M - OL33959162M - OL34882615M - OL48186410M - OL28187622M
- Library of Congress Control Number (LCCN): 2012951709
- All ISBNs: ➤ 3319674218 - 9783319456553 - 3031334973 - 3642346200 - 9783031334979 - 9783319120546 - 3030855287 - 9783030855284 - 3030002012 - 9783030267728 - 3319456555 - 3319120549 - 3031134478 - 3030575233 - 3319120530 - 9783319120539 - 9783030575236 - 9783031134470 - 9783642346200 - 9783319232409 - 9783030002015 - 3319232401 - 9783319674216 - 3030267725
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Modeling Decisions for Artificial Intelligence at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Information Security and Cryptology
By Dongdai Lin, Shouhuai Xu and Moti Yung

“Information Security and Cryptology” Metadata:
- Title: ➤ Information Security and Cryptology
- Authors: Dongdai LinShouhuai XuMoti Yung
- Language: English
- Number of Pages: Median: 549
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2005 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020
“Information Security and Cryptology” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Cryptography - Computer security - Computer crimes - Computer science - Data protection - Coding theory - Computer software - Systems and Data Security - Data Encryption - Coding and Information Theory - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: ➤ OL27982780M - OL34520758M - OL34520412M - OL30681928M - OL28743416M - OL35758151M - OL27967485M - OL27956435M - OL28191991M - OL28200171M - OL27995485M - OL37262695M
- All ISBNs: ➤ 9783319388977 - 3030429202 - 9783030142339 - 9783319547046 - 3030142337 - 9783540324249 - 9783030429201 - 9783319120867 - 331975159X - 3319388983 - 3540324240 - 3319167448 - 3642347037 - 3319120875 - 9783642347030 - 9783319167442 - 3319120867 - 3319167456 - 9783319751597 - 3319388975 - 9783319388984 - 3319547046 - 9783319167459 - 9783319120874
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Digital Forensics and Watermarking
By Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez and Feng Liu

“Digital Forensics and Watermarking” Metadata:
- Title: ➤ Digital Forensics and Watermarking
- Authors: Yun Qing ShiHyoung Joong KimFernando Perez-GonzalezFeng Liu
- Language: English
- Number of Pages: Median: 464
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020
“Digital Forensics and Watermarking” Subjects and Themes:
- Subjects: ➤ Forensic sciences - Computer security - Data protection - Watermarks - Data encryption (computer science) - Data structures (computer science) - Information storage and retrieval systems - Computer graphics - Computer vision - Artificial intelligence - Computer networks - Computer science - Data encryption (Computer science) - Coding theory - Data Encryption - Systems and Data Security - Computer Imaging, Vision, Pattern Recognition and Graphics - Computers and Society - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: ➤ OL28338997M - OL34372353M - OL28363753M - OL36218736M - OL34536829M - OL36215055M - OL28311430M - OL28038987M - OL28292342M - OL28246398M - OL28143742M
- All ISBNs: ➤ 331919321X - 3319193201 - 3319319590 - 9783319319605 - 3662438860 - 9783319193205 - 3319319604 - 9783319193212 - 9783319319599 - 9783319534640 - 9783662438855 - 3662438852 - 3030113884 - 9783662438862 - 3319534645 - 3030435741 - 9783642322044 - 9783319641843 - 3642322042 - 9783030113889 - 9783030435745 - 3319641840
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Watermarking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Secure data management
By Willem Jonker and Milan Petkovic

“Secure data management” Metadata:
- Title: Secure data management
- Authors: Willem JonkerMilan Petkovic
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: ➤ 2004 - 2005 - 2006 - 2007 - 2009 - 2010 - 2012 - 2014
“Secure data management” Subjects and Themes:
- Subjects: ➤ Database security - Computers - Congresses - Access control - Database management - Computer security - Information Systems Applications (incl. Internet) - Computer science - Data encryption (Computer science) - Data protection - Systems and Data Security - Computers and Society - Data Encryption
Edition Identifiers:
- The Open Library ID: ➤ OL37229200M - OL37140922M - OL37140685M - OL37122168M - OL37121881M - OL37121706M - OL37111598M - OL34501369M - OL34374863M - OL9056855M
- Online Computer Library Center (OCLC) ID: 71298972
- Library of Congress Control Number (LCCN): 2006931629
- All ISBNs: ➤ 3540389873 - 9783540300731 - 9783540319740 - 9783319068114 - 9783540389842 - 3540319743 - 3540389849 - 9783319068107 - 3642328725 - 354075248X - 3319068105 - 3642155464 - 3319068113 - 9783540752486 - 9783642328725 - 9783642042195 - 9783540389873 - 3642042198 - 9783642155468 - 3540300732
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure data management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Future Data and Security Engineering
By Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng and Nam Thoai

“Future Data and Security Engineering” Metadata:
- Title: ➤ Future Data and Security Engineering
- Authors: ➤ Tran Khanh DangRoland WagnerErich J. NeuholdMakoto TakizawaJosef KüngNam Thoai
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: ➤ 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - 2021
“Future Data and Security Engineering” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (computer science) - Data mining - Internet - Database management - Information retrieval - Information organization - Computer science - Data protection - Computer software - Information storage and retrieval systems - Information Systems - Management of Computing and Information Systems - Systems and Data Security - Data Encryption - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: ➤ OL37318168M - OL35874579M - OL28026084M - OL27954335M - OL34526419M - OL34520760M - OL28054911M - OL28213947M - OL28349314M - OL34718279M
- All ISBNs: ➤ 9783319127774 - 9783030913861 - 9783319700038 - 9783319261355 - 9783319261348 - 9783319480565 - 3319480561 - 3030031918 - 3319261347 - 9783319127781 - 3319261355 - 3030356523 - 3319127780 - 3030639231 - 3319127772 - 9783030639235 - 9783030031916 - 3030913864 - 3319700030 - 9783030356521
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Future Data and Security Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Internet and Distributed Computing Systems
By Wenfeng Li, Shawkat Ali, Gabriel Lodewijks, Giancarlo Fortino, Giuseppe Di Fatta, Zhouping Yin, Mukaddim Pathan, Antonio Guerrieri and Qiang Wang

“Internet and Distributed Computing Systems” Metadata:
- Title: ➤ Internet and Distributed Computing Systems
- Authors: ➤ Wenfeng LiShawkat AliGabriel LodewijksGiancarlo FortinoGiuseppe Di FattaZhouping YinMukaddim PathanAntonio GuerrieriQiang Wang
- Language: English
- Number of Pages: Median: 411
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2018 - 2019
“Internet and Distributed Computing Systems” Subjects and Themes:
- Subjects: ➤ Internet - Electronic data processing, distributed processing - Computers, periodicals - Software engineering - Information retrieval - Information organization - Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Data protection - Computer software - Information storage and retrieval systems - Algorithm Analysis and Problem Complexity - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL34526598M - OL28128451M - OL34385641M - OL34520639M - OL28216051M - OL28323230M - OL34383679M - OL34520537M - OL27948922M
- All ISBNs: ➤ 3319116924 - 3642414273 - 3319232371 - 3319459392 - 9783319459394 - 9783030349134 - 3030349136 - 9783319116921 - 9783319232379 - 3319977946 - 9783642414282 - 9783642414275 - 9783319977942 - 9783319232362 - 3319232363 - 3319116916 - 9783319116914 - 3642414281
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Internet and Distributed Computing Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Digital Forensics and Cyber Crime
By Pavel Gladyshev

“Digital Forensics and Cyber Crime” Metadata:
- Title: ➤ Digital Forensics and Cyber Crime
- Author: Pavel Gladyshev
- Language: English
- Number of Pages: Median: 305
- Publisher: ➤ Brand: Springer - Springer London, Limited - Springer Berlin Heidelberg - Springer - Springer International Publishing AG - Imprint: Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2021 - 2022
- Publish Location: Berlin, Heidelberg
“Digital Forensics and Cyber Crime” Subjects and Themes:
- Subjects: ➤ Files - Information Systems - Systems and Data Security - Computers and Society - Computer network architectures - Data protection - Computer files - Computer System Implementation - Computer science - Management of Computing and Information Systems - E-Commerce/e-business - Computer crimes - Congresses - Investigation - Computer security - Internetkriminalität - Computerforensik - Computers - Law and legislation - Legal Aspects of Computing
Edition Identifiers:
- The Open Library ID: ➤ OL38012769M - OL36725951M - OL36260467M - OL36211926M - OL28268705M - OL28111209M - OL27032401M
- Library of Congress Control Number (LCCN): 2012953905
- All ISBNs: ➤ 3319142895 - 3030687333 - 3642355161 - 9783319142890 - 3642355153 - 9783319142883 - 9783642355158 - 3642355145 - 3031063643 - 9783030687335 - 3319142887 - 9783642355165 - 9783642355141 - 9783031063640
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Cyber Crime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Cyber Security and Privacy
By Frances Cleary and Massimo Felici

“Cyber Security and Privacy” Metadata:
- Title: Cyber Security and Privacy
- Authors: Frances ClearyMassimo Felici
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2013 - 2014 - 2015 - 2017
“Cyber Security and Privacy” Subjects and Themes:
- Subjects: ➤ Computer security - Internet, security measures - Computer networks, security measures - Data protection - Database management - Information resources management - Computer science - Computer Communication Networks - Information systems - Systems and Data Security - Computers and Society - Computer Appl. in Administrative Data Processing - Computer Science, general
Edition Identifiers:
- The Open Library ID: ➤ OL27972750M - OL30558949M - OL28039552M - OL34526103M - OL37236209M - OL34521572M - OL28406682M - OL28004863M
- All ISBNs: ➤ 3319125753 - 9783642412042 - 3319125745 - 9783319125732 - 9783319125749 - 3319125737 - 9783319253596 - 9783319125756 - 331925359X - 9783642412066 - 364241205X - 9783642412059 - 3642412068 - 3642412041 - 9783319253602 - 3319253603
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Applications and Techniques in Information Security
By Lynn Batten and Gang Li

“Applications and Techniques in Information Security” Metadata:
- Title: ➤ Applications and Techniques in Information Security
- Authors: Lynn BattenGang Li
- Language: English
- Number of Pages: Median: 237
- Publisher: ➤ Ingramcontent - Springer - Batten Lynn - Springer London, Limited
- Publish Date: ➤ 2014 - 2015 - 2016 - 2017 - 2018 - 2019
“Applications and Techniques in Information Security” Subjects and Themes:
- Subjects: ➤ Internet - Congresses - Security measures - Computer networks - Information storage and retrieval systems - Computer security - Information networks - Computer networks, security measures - Computer science - Data encryption (Computer science) - Data protection - Systems and Data Security - Data Encryption
Edition Identifiers:
- The Open Library ID: ➤ OL27992254M - OL27976673M - OL37235292M - OL28224488M - OL30458666M - OL28165191M - OL30090334M - OL28229228M
- All ISBNs: ➤ 9811508704 - 9789811329067 - 3662486822 - 9811329060 - 9811027420 - 9811054207 - 9783662456705 - 9789811508707 - 9783662486825 - 9811027404 - 9789811027406 - 9789811027420 - 3662456699 - 9789811054204 - 3662456702 - 9783662456699
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applications and Techniques in Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Computer Safety, Reliability, and Security
By Friedemann Bitsch, Jérémie Guiochet and Mohamed Kaâniche

“Computer Safety, Reliability, and Security” Metadata:
- Title: ➤ Computer Safety, Reliability, and Security
- Authors: Friedemann BitschJérémie GuiochetMohamed Kaâniche
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Springer International Publishing AG - Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2016 - 2018 - 2019 - 2021 - 2023
“Computer Safety, Reliability, and Security” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, reliability - Software engineering - Computer science - Computer Communication Networks - Data protection - Computer software - Systems and Data Security - Algorithm Analysis and Problem Complexity - Computers and Society - Special Purpose and Application-Based Systems
Edition Identifiers:
- The Open Library ID: ➤ OL49274184M - OL35799239M - OL33950820M - OL28010172M - OL29412909M - OL36251535M - OL34562531M - OL27983239M
- All ISBNs: ➤ 3319991299 - 3319454765 - 9783319454795 - 3030839028 - 9783030839024 - 9783642407932 - 9783030266004 - 3642407927 - 3030266001 - 9783319991290 - 3642407935 - 9783319454764 - 9783031409226 - 9783642407925 - 331945479X - 3031409221
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Safety, Reliability, and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Communications and Multimedia Security
By Bart De Decker and David W. Chadwick

“Communications and Multimedia Security” Metadata:
- Title: ➤ Communications and Multimedia Security
- Authors: Bart De DeckerDavid W. Chadwick
- Language: English
- Number of Pages: Median: 263
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer
- Publish Date: 2010 - 2012 - 2013 - 2014
“Communications and Multimedia Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Telecommunication systems - Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Biometrics - Information Systems - Systems and Data Security - E-Commerce/e-business - Data Encryption - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: ➤ OL30620108M - OL34466769M - OL36215006M - OL36208391M - OL28004474M - OL37229240M
- All ISBNs: ➤ 9783642407796 - 3662448858 - 9783662448847 - 3642328040 - 9783662448854 - 9783642132414 - 366244884X - 9783642407789 - 364240779X - 3642407781 - 9783642328046 - 3642132413
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Communications and Multimedia Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Policies and Research in Identity Management
By Simone Fischer-Hübner

“Policies and Research in Identity Management” Metadata:
- Title: ➤ Policies and Research in Identity Management
- Author: Simone Fischer-Hübner
- Language: English
- Number of Pages: Median: 166
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2010 - 2013 - 2014 - 2015
- Publish Location: Berlin, Heidelberg
“Policies and Research in Identity Management” Subjects and Themes:
- Subjects: ➤ Information Systems - Software engineering - Systems and Data Security - Data protection - Data encryption (Computer science) - Data Encryption - Computer science - Management of Computing and Information Systems - Biometrics - Special Purpose and Application-Based Systems - Computer networks, security measures - Computers, congresses - Research
Edition Identifiers:
- The Open Library ID: ➤ OL37394832M - OL37390210M - OL28953783M - OL28120537M - OL28028288M - OL27081678M
- All ISBNs: ➤ 9780387779966 - 9783642173035 - 0387779965 - 9781441946096 - 9783642423819 - 9783642372827 - 1441946098 - 9783642431159 - 3642431151 - 3642173039 - 3642372821 - 3642423817
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Policies and Research in Identity Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Outlier Analysis
By Charu C. Aggarwal

“Outlier Analysis” Metadata:
- Title: Outlier Analysis
- Author: Charu C. Aggarwal
- Language: English
- Number of Pages: Median: 455
- Publisher: ➤ Brand: Springer - Springer - Springer New York - Imprint: Springer
- Publish Date: 2013 - 2017 - 2018
- Publish Location: New York, NY
“Outlier Analysis” Subjects and Themes:
- Subjects: ➤ Data Mining and Knowledge Discovery - Systems and Data Security - Database management - Information storage and retrieval systems - Information organization - Data protection - Information retrieval - Mathematical statistics - Artificial Intelligence (incl. Robotics) - Computer science - Data mining - Artificial intelligence - Statistics and Computing/Statistics Programs - Statistics - Outliers (Statistics) - Data editing
Edition Identifiers:
- The Open Library ID: OL30506138M - OL28346021M - OL28022722M - OL27306099M - OL27079474M
- Library of Congress Control Number (LCCN): 2012956186
- All ISBNs: ➤ 3319837729 - 9781461463979 - 9781461463955 - 1461463963 - 1461463955 - 1461463971 - 3319475770 - 9783319837727 - 9781461463962 - 9783319475776
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Outlier Analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Introduction to Public Key Infrastructures
By Johannes A. Buchmann, Evangelos Karatsiolis and Alexander Wiesmaier

“Introduction to Public Key Infrastructures” Metadata:
- Title: ➤ Introduction to Public Key Infrastructures
- Authors: Johannes A. BuchmannEvangelos KaratsiolisAlexander Wiesmaier
- Language: English
- Number of Pages: Median: 209
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2013 - 2016
“Introduction to Public Key Infrastructures” Subjects and Themes:
- Subjects: ➤ Data protection - Data structures (computer science) - Computer science - Cryptology and Information Theory Data Structures - Systems and Data Security - E-Commerce/e-business - Security Science and Technology
Edition Identifiers:
- The Open Library ID: OL37420046M - OL27949511M - OL30620493M
- All ISBNs: ➤ 3642406564 - 9783642406560 - 9783642406577 - 3662524503 - 3642406572 - 9783662524503
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Public Key Infrastructures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Human Aspects of Information Security, Privacy and Trust
By Theo Tryfonas

“Human Aspects of Information Security, Privacy and Trust” Metadata:
- Title: ➤ Human Aspects of Information Security, Privacy and Trust
- Author: Theo Tryfonas
- Language: English
- Number of Pages: Median: 719
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014 - 2015 - 2016 - 2017
“Human Aspects of Information Security, Privacy and Trust” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (computer science) - Computer networks, security measures - Human-computer interaction - Congresses - Data protection - Information Systems Applications (incl. Internet) - Information retrieval - Information organization - Computer science - Information storage and retrieval systems - Information Systems - Models and Principles - Systems and Data Security - User Interfaces and Human Computer Interaction - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: ➤ OL29128110M - OL28123951M - OL34386336M - OL37229279M - OL29358561M - OL34526512M
- All ISBNs: ➤ 3319584596 - 9783319076195 - 9783319584591 - 3319076191 - 3319076205 - 3319203754 - 9783319203768 - 9783319393803 - 9783319076201 - 3319203762 - 3319393804 - 9783319203751
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Human Aspects of Information Security, Privacy and Trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Recent Trends in Computer Networks and Distributed Systems Security
By Sabu M. Thampi

“Recent Trends in Computer Networks and Distributed Systems Security” Metadata:
- Title: ➤ Recent Trends in Computer Networks and Distributed Systems Security
- Author: Sabu M. Thampi
- Language: English
- Number of Pages: Median: 532
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer Berlin Heidelberg - Springer - Imprint: Springer
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Recent Trends in Computer Networks and Distributed Systems Security” Subjects and Themes:
- Subjects: ➤ Systems and Data Security - Computer software - Computer networks - Computer science - Algorithm Analysis and Problem Complexity - Coding theory - Data protection - Data Encryption - Coding and Information Theory - Data encryption (Computer science) - Congresses - Security measures - Computer networks, security measures - Electronic data processing, distributed processing - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL37236608M - OL34479315M - OL30619379M - OL28065342M - OL27084739M
- Online Computer Library Center (OCLC) ID: 870290465
- Library of Congress Control Number (LCCN): 2014932169
- All ISBNs: ➤ 9783642545252 - 9783642545245 - 9783642341342 - 3642341365 - 9783642341366 - 3642545246 - 3642545254 - 3642341357 - 9783642341359 - 3642341349
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recent Trends in Computer Networks and Distributed Systems Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Service Oriented and Cloud Computing
By Schahram Dustdar, Frank Leymann and Massimo Villari

“Service Oriented and Cloud Computing” Metadata:
- Title: ➤ Service Oriented and Cloud Computing
- Authors: Schahram DustdarFrank LeymannMassimo Villari
- Language: English
- Number of Pages: Median: 240
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014 - 2015 - 2016
“Service Oriented and Cloud Computing” Subjects and Themes:
- Subjects: ➤ Computer network architectures - Web services - Cloud computing - Database management - Information retrieval - Information organization - Software engineering - Computer science - Data protection - Information storage and retrieval systems - Information Systems - Management information systems - Systems and Data Security - Management of Computing and Information Systems - Business Information Systems
Edition Identifiers:
- The Open Library ID: OL27979949M - OL28035091M - OL27958310M - OL34520811M - OL37249120M
- All ISBNs: ➤ 3319444816 - 9783319444819 - 3662448785 - 3662448793 - 3319240722 - 9783319240718 - 9783319240725 - 9783662448793 - 9783662448786 - 3319240714
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Service Oriented and Cloud Computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Research in Attacks, Intrusions and Defenses
By Angelos Stavrou, Herbert Bos and Georgios Portokalidis

“Research in Attacks, Intrusions and Defenses” Metadata:
- Title: ➤ Research in Attacks, Intrusions and Defenses
- Authors: Angelos StavrouHerbert BosGeorgios Portokalidis
- Language: English
- Number of Pages: Median: 578
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013 - 2014 - 2015
“Research in Attacks, Intrusions and Defenses” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL37229053M - OL37250826M - OL37229228M - OL28118873M - OL28109762M
- All ISBNs: ➤ 9783319263625 - 364241284X - 9783642412844 - 9783319113791 - 3319263617 - 9783319263618 - 331911378X - 9783319113784 - 3319263625 - 3319113798
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Research in Attacks, Intrusions and Defenses at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Security, Privacy, and Applied Cryptography Engineering
By Rajat Subhra Chakraborty, Peter Schwabe and Jon Solworth
“Security, Privacy, and Applied Cryptography Engineering” Metadata:
- Title: ➤ Security, Privacy, and Applied Cryptography Engineering
- Authors: Rajat Subhra ChakrabortyPeter SchwabeJon Solworth
- Language: English
- Number of Pages: Median: 373
- Publisher: ➤ Springer International Publishing AG - Springer London, Limited
- Publish Date: 2014 - 2015
“Security, Privacy, and Applied Cryptography Engineering” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Data Encryption - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL34526422M - OL36214981M - OL34524217M - OL36208708M
- All ISBNs: ➤ 9783319241258 - 9783319120591 - 3319241265 - 9783319120607 - 331912059X - 3319120603 - 3319241257 - 9783319241265
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security, Privacy, and Applied Cryptography Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Trustworthy Computing and Services
By Yuyu Yuan, Xu Wu and Yueming Lu

“Trustworthy Computing and Services” Metadata:
- Title: ➤ Trustworthy Computing and Services
- Authors: Yuyu YuanXu WuYueming Lu
- Language: English
- Number of Pages: Median: 760
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited - Brand: Springer
- Publish Date: 2013 - 2014
“Trustworthy Computing and Services” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Data encryption (computer science) - Computer science - Data protection - Systems and Data Security - Database management - Software engineering - Operating systems (Computers) - Computer Communication Networks - Operating Systems - Data Encryption
Edition Identifiers:
- The Open Library ID: OL28016441M - OL28259852M - OL37235682M - OL37182679M - OL37235693M
- All ISBNs: ➤ 9783662439081 - 3662439085 - 9783642357954 - 9783642357947 - 3642357962 - 3662439077 - 9783662439074 - 3642357946 - 9783642357961 - 3642357954
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trustworthy Computing and Services at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Global Security, Safety, and Sustainability
By Hamid Jahankhani, Christos K. Georgiadis and Elias Pimenidis

“Global Security, Safety, and Sustainability” Metadata:
- Title: ➤ Global Security, Safety, and Sustainability
- Authors: Hamid JahankhaniChristos K. GeorgiadisElias Pimenidis
- Language: English
- Number of Pages: Median: 305
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2009 - 2010 - 2012
“Global Security, Safety, and Sustainability” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Computer networks, security measures - Computer networks, congresses - Internet, security measures - Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Biometrics - Computers and Society - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL35765419M - OL37101013M - OL28108870M - OL28143226M - OL37427166M
- All ISBNs: ➤ 3642334482 - 3642334490 - 9783642040627 - 9783642334498 - 3642334474 - 9783642334481 - 3642157173 - 9783642157172 - 9783642334474 - 3642040624
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Global Security, Safety, and Sustainability at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27ICT Systems Security and Privacy Protection
By Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam and Thierry Sans

“ICT Systems Security and Privacy Protection” Metadata:
- Title: ➤ ICT Systems Security and Privacy Protection
- Authors: Nora Cuppens-BoulahiaFrederic CuppensSushil JajodiaAnas Abou El KalamThierry Sans
- Language: English
- Number of Pages: Median: 509
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited
- Publish Date: 2014 - 2016
“ICT Systems Security and Privacy Protection” Subjects and Themes:
- Subjects: ➤ Computer science - Computer security - Internet, security measures - Computer networks, security measures - Database management - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL37181184M - OL31438763M - OL27947274M - OL37234456M
- All ISBNs: ➤ 9783642554148 - 3642554148 - 3642554156 - 3662515415 - 3642554164 - 9783662515419 - 9783642554162 - 9783642554155
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find ICT Systems Security and Privacy Protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Security and Privacy in Mobile Information and Communication Systems
By Andreas U. Schmidt, Giovanni Russello and Antonio Lioy

“Security and Privacy in Mobile Information and Communication Systems” Metadata:
- Title: ➤ Security and Privacy in Mobile Information and Communication Systems
- Authors: Andreas U. SchmidtGiovanni RusselloAntonio Lioy
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer - Springer Berlin / Heidelberg
- Publish Date: 2010 - 2011 - 2012
“Security and Privacy in Mobile Information and Communication Systems” Subjects and Themes:
- Subjects: ➤ Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Computer network architectures - Data protection - Information Systems - Systems and Data Security - Computer System Implementation - Management of Computing and Information Systems - Computers and Society
Edition Identifiers:
- The Open Library ID: OL28144304M - OL29371522M - OL34883319M - OL36200530M - OL35927412M
- All ISBNs: ➤ 9783642175022 - 3642175023 - 3642333923 - 9783642333910 - 3642302459 - 9783642302459 - 3642175031 - 9783642175039 - 3642333915 - 9783642333927
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security and Privacy in Mobile Information and Communication Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Privacy Technologies and Policy
By Bart Preneel and Demosthenes Ikonomou
“Privacy Technologies and Policy” Metadata:
- Title: ➤ Privacy Technologies and Policy
- Authors: Bart PreneelDemosthenes Ikonomou
- Language: English
- Number of Pages: Median: 213
- Publisher: ➤ Springer London, Limited - Springer International Publishing AG
- Publish Date: 2014 - 2016
“Privacy Technologies and Policy” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (computer science) - Computer science - Information Systems Applications (incl. Internet) - Data protection - Computers and Society - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL34533478M - OL34520394M - OL37228844M - OL34501363M - OL34533431M
- All ISBNs: ➤ 9783642540691 - 3319314564 - 9783319314556 - 3319067494 - 3642540694 - 3319314556 - 9783319067490 - 9783319314563 - 3319067486 - 9783319067483
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Privacy Technologies and Policy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Computer Networks
By Andrzej Kwiecień

“Computer Networks” Metadata:
- Title: Computer Networks
- Author: Andrzej Kwiecień
- Language: English
- Number of Pages: Median: 458
- Publisher: ➤ Springer - Springer Berlin Heidelberg
- Publish Date: ➤ 2012 - 2016 - 2017 - 2018 - 2020
- Publish Location: Berlin, Heidelberg
“Computer Networks” Subjects and Themes:
- Subjects: ➤ Systems and Data Security - Software engineering - Probability and Statistics in Computer Science - Computer networks - Data protection - Computer system performance - Information Systems Applications (incl. Internet) - Computer science - System Performance and Evaluation - System failures (engineering) - Information technology - Computer software, development - Artificial intelligence - Information theory - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL28347971M - OL28230439M - OL28227047M - OL27967983M - OL27026188M
- All ISBNs: ➤ 9783030507183 - 9783319597669 - 3642312179 - 3319597663 - 3319924583 - 9783319924588 - 9783642312175 - 3030507181 - 3319392069 - 9783319392066
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Information Security and Privacy
By Colin Boyd

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: Colin Boyd
- Language: English
- Number of Pages: Median: 488
- Publisher: ➤ Imprint: Springer - Springer - Springer London, Limited - Springer Berlin Heidelberg
- Publish Date: 2005 - 2006 - 2009 - 2013
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - E-Commerce/e-business - Data protection - Data encryption (Computer science) - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Coding theory - Data Encryption - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL34472544M - OL34456812M - OL30531247M - OL28260304M - OL27045487M
- All ISBNs: ➤ 3642390609 - 9783540316848 - 9783540450306 - 3540316841 - 3642390595 - 9783642026218 - 9783642390593 - 9783642390609 - 3540450300 - 3642026214
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Information Security and Privacy
By Willy Susilo

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: Willy Susilo
- Language: English
- Number of Pages: Median: 848
- Publisher: ➤ Springer London, Limited - Springer Berlin Heidelberg - Springer - Springer International Publishing AG - Imprint: Springer
- Publish Date: 2012 - 2014 - 2018 - 2024
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - E-Commerce/e-business - Data protection - Data encryption (Computer science) - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Coding theory - Data Encryption - Coding and Information Theory - Computer security - Information Systems
Edition Identifiers:
- The Open Library ID: OL52561500M - OL36214962M - OL36207127M - OL28322758M - OL27045492M
- All ISBNs: ➤ 9783319083438 - 3319936379 - 9789819750276 - 981975027X - 3319083449 - 9783642314483 - 3642314481 - 9783319083445 - 9783319936376 - 3319083430
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Trust, Privacy and Security in Digital Business
By Simone Fischer-Hübner

“Trust, Privacy and Security in Digital Business” Metadata:
- Title: ➤ Trust, Privacy and Security in Digital Business
- Author: Simone Fischer-Hübner
- Language: English
- Number of Pages: Median: 252
- Publisher: ➤ Springer - Springer Berlin Heidelberg - Imprint: Springer - Springer London, Limited - Springer Berlin / Heidelberg
- Publish Date: 2012 - 2015 - 2017
- Publish Location: Berlin, Heidelberg
“Trust, Privacy and Security in Digital Business” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - Computer networks - Information Systems Applications (incl. Internet) - Data protection - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Data Encryption - Data encryption (Computer science) - Business enterprises, computer networks - Computer security - Electronic commerce - Congresses - Security measures - Internet - Commerce électronique - Congrès - Sécurité - Mesures - Sécurité informatique - Réseaux d'ordinateurs - Informatique - Computer Communication Networks - Information Systems
Edition Identifiers:
- The Open Library ID: OL36218765M - OL36200248M - OL28213477M - OL27954675M - OL27092987M
- Online Computer Library Center (OCLC) ID: 808634201
- All ISBNs: ➤ 3319644823 - 9783319229058 - 9783642322877 - 3319229060 - 9783319229065 - 3319229052 - 3642322867 - 3642322875 - 9783319644820 - 9783642322860
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, Privacy and Security in Digital Business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Risk Assessment and Risk-Driven Testing
By Thomas Bauer, Jürgen Großmann, Fredrik Seehusen, Ketil Stølen and Marc-Florian Wendland

“Risk Assessment and Risk-Driven Testing” Metadata:
- Title: ➤ Risk Assessment and Risk-Driven Testing
- Authors: Thomas BauerJürgen GroßmannFredrik SeehusenKetil StølenMarc-Florian Wendland
- Language: English
- Number of Pages: Median: 129
- Publisher: ➤ Springer International Publishing AG - Springer London, Limited - Springer
- Publish Date: 2014 - 2015
“Risk Assessment and Risk-Driven Testing” Subjects and Themes:
- Subjects: ➤ Computer software, testing - Computer programming - Risk management - Software engineering - Computer science - Data protection - Information Systems - Management of Computing and Information Systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: OL29285915M - OL34526294M - OL34520730M - OL34528554M
- All ISBNs: ➤ 9783319070766 - 9783319264165 - 9783319264158 - 3319070754 - 9783319070759 - 3319070762 - 331926415X - 3319264168
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Risk Assessment and Risk-Driven Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Advances in Cryptology - CRYPTO 2013
By Ran Canetti and Juan A. Garay
“Advances in Cryptology - CRYPTO 2013” Metadata:
- Title: ➤ Advances in Cryptology - CRYPTO 2013
- Authors: Ran CanettiJuan A. Garay
- Language: English
- Number of Pages: Median: 567
- Publisher: ➤ Springer - Springer Berlin / Heidelberg - Springer London, Limited
- Publish Date: 2013
“Advances in Cryptology - CRYPTO 2013” Subjects and Themes:
- Subjects: ➤ Computer science - Data encryption (Computer science) - Data protection - Computer software - Computational complexity - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Discrete Mathematics in Computer Science - Computer Science, general
Edition Identifiers:
- The Open Library ID: OL34520737M - OL34520757M - OL30545203M - OL34490536M
- All ISBNs: ➤ 3642400418 - 9783642400858 - 3642400833 - 3642400841 - 9783642400414 - 364240085X - 9783642400841 - 9783642400834
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology - CRYPTO 2013 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Network Science and Cybersecurity
By Robinson E. Pino

“Network Science and Cybersecurity” Metadata:
- Title: ➤ Network Science and Cybersecurity
- Author: Robinson E. Pino
- Language: English
- Number of Pages: Median: 285
- Publisher: ➤ Springer - Springer Science+Business Media - Springer London, Limited
- Publish Date: 2013 - 2014 - 2015
- Publish Location: New York
“Network Science and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Computer security - Computer networks - Data protection - Internet, security measures - Computer science - Data encryption (Computer science) - Data structures (Computer science) - Computer Communication Networks - Telecommunication - Systems and Data Security - Data Encryption - Cryptology and Information Theory Data Structures - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL31013163M - OL35499841M - OL29308731M - OL27968752M
- Online Computer Library Center (OCLC) ID: 835373463
- Library of Congress Control Number (LCCN): 2013942470
- All ISBNs: ➤ 1461475961 - 9781489990655 - 9781461475989 - 9781461475965 - 1489990658 - 1461475988 - 146147597X - 9781461475972
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network Science and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37The Hash Function BLAKE
By Jean-Philippe Aumasson, Willi Meier, Raphael C.-W Phan and Luca Henzen

“The Hash Function BLAKE” Metadata:
- Title: The Hash Function BLAKE
- Authors: Jean-Philippe AumassonWilli MeierRaphael C.-W PhanLuca Henzen
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2014 - 2015 - 2016
“The Hash Function BLAKE” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Computer science - Data protection - Computer software - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Security Science and Technology
Edition Identifiers:
- The Open Library ID: OL34383437M - OL28169501M - OL35805732M
- All ISBNs: ➤ 9783662447567 - 3662525976 - 9783662447574 - 3662447576 - 3662447568 - 9783662525975
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Hash Function BLAKE at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Privacy Enhancing Technologies
By Emiliano De Cristofaro and Steven J. Murdoch

“Privacy Enhancing Technologies” Metadata:
- Title: Privacy Enhancing Technologies
- Authors: Emiliano De CristofaroSteven J. Murdoch
- Language: English
- Number of Pages: Median: 310
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited
- Publish Date: 2013 - 2014
“Privacy Enhancing Technologies” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Congresses - Computer science - Data encryption (Computer science) - Data protection - Information Systems - Systems and Data Security - Computers and Society - Data Encryption - Management of Computing and Information Systems - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL37229147M - OL27982727M - OL27966380M - OL35782203M
- All ISBNs: ➤ 9783319085067 - 9783319085050 - 3319085069 - 3319085050 - 9783642390760 - 3642390765 - 9783642390784 - 3642390781
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy Enhancing Technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Computer Safety, Reliability, and Security
By Andrea Bondavalli and Felicita Di Giandomenico
“Computer Safety, Reliability, and Security” Metadata:
- Title: ➤ Computer Safety, Reliability, and Security
- Authors: Andrea BondavalliFelicita Di Giandomenico
- Language: English
- Number of Pages: Median: 356
- Publisher: ➤ Springer London, Limited - Springer International Publishing AG - Springer
- Publish Date: 2014 - 2024
“Computer Safety, Reliability, and Security” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Software engineering - Data protection - Logic design - Artificial intelligence - Computer network architectures - Logics and Meanings of Programs - Computer Systems Organization and Communication Networks - Systems and Data Security
Edition Identifiers:
- The Open Library ID: OL53261565M - OL34506016M - OL34520835M - OL34505734M
- All ISBNs: ➤ 3031686055 - 3319105566 - 3319105051 - 9783319105055 - 9783319105062 - 331910506X - 9783031686054 - 9783319105567
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Computer Safety, Reliability, and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Model-driven risk analysis
By Mass Soldal Lund

“Model-driven risk analysis” Metadata:
- Title: Model-driven risk analysis
- Author: Mass Soldal Lund
- Language: English
- Number of Pages: Median: 469
- Publisher: ➤ Springer - Springer Berlin / Heidelberg
- Publish Date: 2010 - 2014
- Publish Location: London - Berlin - New York
“Model-driven risk analysis” Subjects and Themes:
- Subjects: ➤ Risk management - Computer simulation - Risk assessment - System safety - Information Systems - Technology - Computer science - Data protection - Systems and Data Security - Quality Control, Reliability, Safety and Risk - Technology Management - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL24895728M - OL35760698M - OL27954421M - OL35791399M
- Online Computer Library Center (OCLC) ID: 619662369
- Library of Congress Control Number (LCCN): 2010936190
- All ISBNs: ➤ 3642123236 - 9783642123238 - 9783642123245 - 9783642447013 - 3642447015 - 3642123228 - 9783642123221 - 3642123244
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Model-driven risk analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Critical Information Infrastructures Security
By Javier Lopez

“Critical Information Infrastructures Security” Metadata:
- Title: ➤ Critical Information Infrastructures Security
- Author: Javier Lopez
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2007 - 2013
“Critical Information Infrastructures Security” Subjects and Themes:
- Subjects: ➤ Computer security - Congresses - Computers - Access control - Computers, access control - Computers, congresses - Computer science - Computer networks, security measures - Data encryption (computer science) - Computer Communication Networks - Data protection - Systems and Data Security - Computers and Society
Edition Identifiers:
- The Open Library ID: OL34452486M - OL27960177M - OL30476133M - OL12810196M
- Online Computer Library Center (OCLC) ID: 77482493
- Library of Congress Control Number (LCCN): 2006938669
- All ISBNs: ➤ 3540690832 - 3642414842 - 9783540690832 - 9783540690849 - 3642414869 - 9783642414862 - 9783642414848 - 3540690840
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Critical Information Infrastructures Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Advances in Cryptology -- CRYPTO 2014
By Juan A. Garay and Rosario Gennaro

“Advances in Cryptology -- CRYPTO 2014” Metadata:
- Title: ➤ Advances in Cryptology -- CRYPTO 2014
- Authors: Juan A. GarayRosario Gennaro
- Language: English
- Number of Pages: Median: 574
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer
- Publish Date: 2014
“Advances in Cryptology -- CRYPTO 2014” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Computer science - Data encryption (Computer science) - Data protection - Computer software - Computational complexity - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Discrete Mathematics in Computer Science
Edition Identifiers:
- The Open Library ID: OL35799253M - OL34520640M - OL28041952M - OL34505319M
- All ISBNs: ➤ 3662443813 - 9783662443705 - 3662443708 - 9783662443811 - 3662443805 - 9783662443804 - 3662443716 - 9783662443712
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology -- CRYPTO 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Computer Security -- ESORICS 2013
By Jason Crampton, Sushil Jajodia and Keith Mayes

“Computer Security -- ESORICS 2013” Metadata:
- Title: ➤ Computer Security -- ESORICS 2013
- Authors: Jason CramptonSushil JajodiaKeith Mayes
- Language: English
- Number of Pages: Median: 813
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013
“Computer Security -- ESORICS 2013” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Data Encryption - Management of Computing and Information Systems - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL37228965M - OL28136414M - OL31373537M
- All ISBNs: ➤ 9783642402043 - 9783642402036 - 364240202X - 3642402046 - 9783642402029 - 3642402038
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security -- ESORICS 2013 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Open Problems in Network Security
By Jan Camenisch

“Open Problems in Network Security” Metadata:
- Title: ➤ Open Problems in Network Security
- Author: Jan Camenisch
- Language: English
- Number of Pages: Median: 134
- Publisher: ➤ Springer Berlin Heidelberg - Springer London, Limited - Springer
- Publish Date: 2012 - 2013 - 2016
- Publish Location: Berlin, Heidelberg
“Open Problems in Network Security” Subjects and Themes:
- Subjects: ➤ Information Systems - Systems and Data Security - Computers and Society - Computer networks - Data protection - Data Encryption - Computer science - Management of Computing and Information Systems - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Computer networks, security measures - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL27078737M - OL28015725M - OL30512809M - OL34534618M
- All ISBNs: ➤ 3642275850 - 9783642275869 - 3319390287 - 9783642275852 - 9783319390284 - 9783319390277 - 3319390279 - 3642275869
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Open Problems in Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Trust Management VIII
By Jianying Zhou, Nurit Gal-Oz and Jie Zhang

“Trust Management VIII” Metadata:
- Title: Trust Management VIII
- Authors: Jianying ZhouNurit Gal-OzJie Zhang
- Language: English
- Number of Pages: Median: 259
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2014 - 2016
“Trust Management VIII” Subjects and Themes:
- Subjects: ➤ Web services - Computer security - Congresses - Computer networks - Security measures - Computer science - Data protection - Information systems - Computers and Society - Systems and Data Security - Information Systems and Communication Service
Edition Identifiers:
- The Open Library ID: OL37426238M - OL29571130M - OL28117878M - OL37182919M
- All ISBNs: ➤ 9783662438121 - 9783662438138 - 3662438127 - 3662438143 - 9783662515624 - 3662515628 - 3662438135 - 9783662438145
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust Management VIII at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Distributed Computing and Networking
By Mainak Chatterjee, Jian-nong Cao, Kishore Kothapalli and Sergio Rajsbaum

“Distributed Computing and Networking” Metadata:
- Title: ➤ Distributed Computing and Networking
- Authors: Mainak ChatterjeeJian-nong CaoKishore KothapalliSergio Rajsbaum
- Language: English
- Number of Pages: Median: 570
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2007 - 2009 - 2013 - 2014
“Distributed Computing and Networking” Subjects and Themes:
- Subjects: ➤ Electronic data processing, distributed processing - Computer networks - Information Systems Applications (incl. Internet) - Software engineering - Computer science - Computer Communication Networks - Data protection - Computer software - Programming Techniques - Systems and Data Security - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: OL34520696M - OL28118758M - OL35768912M - OL34452502M
- All ISBNs: ➤ 3540922954 - 9783540922957 - 9783540774440 - 3540774440 - 3642452493 - 9783642452499 - 9783642452482 - 3642452485
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Distributed Computing and Networking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Advances in Cryptology -- ASIACRYPT 2014
By Palash Sarkar and Tetsu Iwata

“Advances in Cryptology -- ASIACRYPT 2014” Metadata:
- Title: ➤ Advances in Cryptology -- ASIACRYPT 2014
- Authors: Palash SarkarTetsu Iwata
- Language: English
- Number of Pages: Median: 561
- Publisher: ➤ Springer London, Limited - Springer - Springer Berlin / Heidelberg
- Publish Date: 2014
“Advances in Cryptology -- ASIACRYPT 2014” Subjects and Themes:
- Subjects: ➤ Cryptography - Computer security - Computer science - Data encryption (Computer science) - Data protection - Coding theory - Information theory - Information Systems - Data Encryption - Systems and Data Security - Coding and Information Theory - Management of Computing and Information Systems - Theory of Computation - Mathematics of Computing
Edition Identifiers:
- The Open Library ID: OL37228765M - OL28108100M - OL36211406M - OL37229324M
- All ISBNs: ➤ 3662456109 - 3662456087 - 3662456079 - 9783662456118 - 3662456117 - 9783662456101 - 9783662456071 - 9783662456088
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology -- ASIACRYPT 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Security Standardisation Research
By Lidong Chen, David McGrew and Chris Mitchell

“Security Standardisation Research” Metadata:
- Title: ➤ Security Standardisation Research
- Authors: Lidong ChenDavid McGrewChris Mitchell
- Language: English
- Number of Pages: Median: 257
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: 2014 - 2016 - 2020
“Security Standardisation Research” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Computer Communication Networks - Data protection - Data structures (Computer science) - Data encryption (Computer science) - Systems and Data Security - Data Encryption - Data Structures - Math Applications in Computer Science
Edition Identifiers:
- The Open Library ID: OL34511084M - OL31948723M - OL34520822M - OL28134810M
- All ISBNs: ➤ 9783030643560 - 3319140531 - 3030643565 - 331914054X - 9783319490991 - 9783319140537 - 3319490990 - 9783319140544
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Standardisation Research at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Digital Forensics and Cyber Crime
By Marcus K. Rogers and Kathryn C. Seigfried-Spellar

“Digital Forensics and Cyber Crime” Metadata:
- Title: ➤ Digital Forensics and Cyber Crime
- Authors: Marcus K. RogersKathryn C. Seigfried-Spellar
- Language: English
- Number of Pages: Median: 344
- Publisher: Springer
- Publish Date: 2013
“Digital Forensics and Cyber Crime” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Computer network architectures - Data protection - Congresses - Investigation - Computer science - Systems and Data Security - E-Commerce/e-business - Computers and Society
Edition Identifiers:
- The Open Library ID: OL28050564M - OL37427307M - OL30625147M
- Online Computer Library Center (OCLC) ID: 858089201
- All ISBNs: ➤ 3642398928 - 3642398901 - 9783642398902 - 9783642398926 - 364239891X - 9783642398919
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Cyber Crime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Visual Cryptography for Image Processing and Security
By Feng Liu and Wei Qi Yan

“Visual Cryptography for Image Processing and Security” Metadata:
- Title: ➤ Visual Cryptography for Image Processing and Security
- Authors: Feng LiuWei Qi Yan
- Language: English
- Number of Pages: Median: 176
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014 - 2015 - 2016
“Visual Cryptography for Image Processing and Security” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Image processing, digital techniques - Computer science - Data protection - Coding theory - Computer vision - Image Processing and Computer Vision - Systems and Data Security - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL37246662M - OL28126513M - OL28140303M - OL37413920M
- All ISBNs: ➤ 9783319096445 - 3319363840 - 9783319363844 - 3319096443 - 9783319234724 - 3319234722 - 9783319234731 - 3319234730
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Visual Cryptography for Image Processing and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.