Explore: Zugriffskontrolle
Discover books, insights, and more — all in one place.
Learn more about Zugriffskontrolle with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “zugriffskontrolle”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Codes, ciphers, and computers
By Bruce Bosworth

“Codes, ciphers, and computers” Metadata:
- Title: Codes, ciphers, and computers
- Author: Bruce Bosworth
- Language: English
- Number of Pages: Median: 259
- Publisher: Hayden Book Co.
- Publish Date: 1982
- Publish Location: Rochelle Park, N.J
“Codes, ciphers, and computers” Subjects and Themes:
- Subjects: ➤ Passwords - Cryptography - Access control - Computers - Data protection - Zugriffskontrolle - Computer - Kryptologie
Edition Identifiers:
- The Open Library ID: OL3483618M
- Library of Congress Control Number (LCCN): 82003068
- All ISBNs: 0810451492 - 9780810451490
Access and General Info:
- First Year Published: 1982
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Codes, ciphers, and computers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Security for computer networks
By D. W. Davies and Donald Watts Davies

“Security for computer networks” Metadata:
- Title: Security for computer networks
- Authors: D. W. DaviesDonald Watts Davies
- Language: English
- Number of Pages: Median: 382
- Publisher: Wiley
- Publish Date: 1984 - 1989
- Publish Location: Chichester
“Security for computer networks” Subjects and Themes:
- Subjects: ➤ Computers - Access control - Security measures - Data transmission systems - Surete - Rechnernetz - Transmission - Zugriffskontrolle - Systemes - Computersicherheit - Donnees - Données - Sûreté - Systèmes
Edition Identifiers:
- The Open Library ID: OL21474667M - OL21473648M
- Online Computer Library Center (OCLC) ID: 19885725
- Library of Congress Control Number (LCCN): 89014760
- All ISBNs: ➤ 3519064413 - 0471921378 - 047190063X - 9780471921370 - 9780471900634 - 9783519064411
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Security for computer networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Computer control and security
a guide for managers and systems analysts
By William E. Perry

“Computer control and security” Metadata:
- Title: Computer control and security
- Author: William E. Perry
- Language: English
- Number of Pages: Median: 207
- Publisher: Wiley
- Publish Date: 1981
- Publish Location: New York
“Computer control and security” Subjects and Themes:
- Subjects: ➤ Electronic data processing departments - Security measures - Computer security - Computer - Access control - Datenschutz - Computers - Zugriffskontrolle - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL4115190M
- Online Computer Library Center (OCLC) ID: 7172694
- Library of Congress Control Number (LCCN): 80039936
- All ISBNs: 9780471052357 - 0471052353
Access and General Info:
- First Year Published: 1981
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer control and security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Control and security of computer information systems
By Philip E. Fites

“Control and security of computer information systems” Metadata:
- Title: ➤ Control and security of computer information systems
- Author: Philip E. Fites
- Language: English
- Number of Pages: Median: 298
- Publisher: Computer Science Press
- Publish Date: 1989
- Publish Location: Rockville, MD
“Control and security of computer information systems” Subjects and Themes:
- Subjects: ➤ Computer security - Zugriffskontrolle - Datensicherung - Informationssystem - Contrôle - Accès - Ordinateurs - Datenschutz - Computer - Computers, access control
Edition Identifiers:
- The Open Library ID: OL2042949M
- Library of Congress Control Number (LCCN): 88019748
- All ISBNs: 9780716781912 - 0716781913
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Control and security of computer information systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Information Security
By Mark Stamp

“Information Security” Metadata:
- Title: Information Security
- Author: Mark Stamp
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - John Wiley & Sons, Ltd. - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2005 - 2006 - 2007 - 2011 - 2021 - 2022
- Publish Location: Hoboken, N.J - New York
“Information Security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Electronic data processing departments, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Logiciels - Protection - Protocoles de réseaux d'ordinateurs - Sécurité - Mesures - Cryptographie - Databescherming - Informatiesystemen - Computersicherheit - Datensicherung - Kommunikationsprotokoll - Kryptologie - Malware - Zugriffskontrolle - Data protection - Computer Security - Qa76.9.a25 s69 2006 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL48712508M - OL48647918M - OL39897508M - OL34977085M - OL33919263M - OL33919251M - OL33642192M - OL29229520M - OL29065438M - OL29065437M - OL9527643M - OL7620834M - OL24253402M - OL15978508M
- Online Computer Library Center (OCLC) ID: 57754240 - 85820655
- Library of Congress Control Number (LCCN): 2005005152
- All ISBNs: ➤ 1119505879 - 1119505887 - 1118027965 - 9781119505891 - 1283138875 - 1119505895 - 9780471744184 - 0470242442 - 9781283138871 - 9781280241444 - 0471744190 - 9780470242445 - 0471738484 - 1118027957 - 1280241446 - 1118027973 - 9781119505907 - 9781118027967 - 9780471738480 - 9781118027974 - 1119505909 - 0471744182 - 9781118027950 - 9781119505884 - 9781119505877 - 9780471744191
First Setence:
"The basic terminology of crypto includes the following."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6The net delusion
By Evgeny Morozov, E. Morozov and Eduardo G. Murillo

“The net delusion” Metadata:
- Title: The net delusion
- Authors: Evgeny MorozovE. MorozovEduardo G. Murillo
- Languages: rus - English
- Number of Pages: Median: 432
- Publisher: ➤ Ediciones Destino - Allen Lane : Penguin Books - АСТ - PENGUIN UK - PublicAffairs - Public Affairs - Penguin Books, Limited - Penguin Press/Classics
- Publish Date: 2011 - 2012 - 2014
- Publish Location: New York - Москва, Россия
“The net delusion” Subjects and Themes:
- Subjects: ➤ Political aspects - Censorship - Access control - Internet - Freedom of information - Computers - Internet, political aspects - Information society - New York Times reviewed - Computers, access control - Aspect politique - Censure - Liberté d'information - Société numérique - Media Studies - Informationsfreiheit - Zensur - Propaganda - Privatsphäre - Datenschutz - Zugriffskontrolle - Politik - Politiska aspekter - Censur - Informationsfrihet - Informationssamhället - Demokratisering - Internet--political aspects - Internet--censorship - Computers--access control - Hm851 .m665 2011 - 303.48/33 - Social networking - Civil rights - Fascism & totalitarianism - Professional, career & trade -> computer science -> internet & www - Cs.soc_sci.poli_sci.gen_polit_sc
Edition Identifiers:
- The Open Library ID: ➤ OL51723733M - OL47503415M - OL47503414M - OL28259613M - OL38790658M - OL34830709M - OL34497928M - OL34471632M - OL29078442M - OL27595510M - OL24384759M
- Online Computer Library Center (OCLC) ID: 806162088 - 820727695 - 515438457
- Library of Congress Control Number (LCCN): 2010039066
- All ISBNs: ➤ 9781280588075 - 9780141961828 - 1610391632 - 0141961821 - 1280588071 - 9785170847921 - 9781610391634 - 9781586488741 - 9781846143533 - 1846143535 - 5170847920 - 9780141049571 - 9781586488758 - 1610391063 - 1586488759 - 9781610391061 - 8423327795 - 1586488740 - 014104957X - 9788423327799
Author's Alternative Names:
"Evgeny V. Morozov" and "Евгений Морозов"Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The net delusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Mechanics of user identification and authentication
By Dobromir Todorov

“Mechanics of user identification and authentication” Metadata:
- Title: ➤ Mechanics of user identification and authentication
- Author: Dobromir Todorov
- Language: English
- Number of Pages: Median: 744
- Publisher: ➤ Auerbach Publications - Auerbach Pub - Auerbach Publishers, Incorporated - Taylor and Francis - AUERBACH
- Publish Date: 2007
- Publish Location: London - Boca Raton, FL
“Mechanics of user identification and authentication” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Security measures - Computers - Access control - Computer security - Computer networks, security measures - Computers, access control - Authentication - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Sécurité informatique - Systèmes d'exploitation (Ordinateurs) - Authentification - COMPUTERS - Internet - Security - Networking - General - Authentifikation - Computersicherheit - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL37980829M - OL37950430M - OL8484655M - OL22757383M - OL24278188M
- Online Computer Library Center (OCLC) ID: 263353270 - 77716961
- Library of Congress Control Number (LCCN): 2007060355
- All ISBNs: ➤ 9780429133138 - 1466546689 - 0429133138 - 9781420052206 - 1420052209 - 9781420052190 - 1420052195 - 9781466546684
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mechanics of user identification and authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Security for Web Services and Service-Oriented Architectures
By Elisa Bertino

“Security for Web Services and Service-Oriented Architectures” Metadata:
- Title: ➤ Security for Web Services and Service-Oriented Architectures
- Author: Elisa Bertino
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Springer-Verlag Berlin Heidelberg - Springer
- Publish Date: 2010 - 2014
- Publish Location: Berlin, Heidelberg
“Security for Web Services and Service-Oriented Architectures” Subjects and Themes:
- Subjects: ➤ Software engineering - Information systems - Computer science - Data protection - Management information systems - Information storage and retrieval systems - Computer security - Web services - Computer networks, security measures - Computer networks - Security measures - Service-oriented architecture (Computer science) - Identitätsverwaltung - Zugriffskontrolle - Sicherheit - Web Services - Serviceorientierte Architektur - Kryptoanalyse - Datensicherung - Web servers - Computer network architectures - Application software - Identitatsverwaltung
Edition Identifiers:
- The Open Library ID: OL25572993M - OL28271303M - OL28135448M
- Online Computer Library Center (OCLC) ID: 268931371
- Library of Congress Control Number (LCCN): 2009936010
- All ISBNs: ➤ 9783642426032 - 3642426034 - 9783540877417 - 354087741X - 9783540877899 - 3540877894 - 3540877428 - 9783540877424
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security for Web Services and Service-Oriented Architectures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Cross enterprise integration with SAP GRC Access Control
By Raj Behera

“Cross enterprise integration with SAP GRC Access Control” Metadata:
- Title: ➤ Cross enterprise integration with SAP GRC Access Control
- Author: Raj Behera
- Language: English
- Number of Pages: Median: 138
- Publisher: Galileo Press
- Publish Date: 2009
- Publish Location: Boston, MA - Bonn
“Cross enterprise integration with SAP GRC Access Control” Subjects and Themes:
- Subjects: SAP GRC - Zugriffskontrolle - Computer software
Edition Identifiers:
- The Open Library ID: OL27028125M
- Online Computer Library Center (OCLC) ID: 458689521
- All ISBNs: 159229250X - 9781592292509
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cross enterprise integration with SAP GRC Access Control at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Detection Of Intrusions And Malware And Vulnerability Assessment 6th International Conference Dimva 2009 Como Italy July 910 2009 Proceedings
By Ulrich Flegel

“Detection Of Intrusions And Malware And Vulnerability Assessment 6th International Conference Dimva 2009 Como Italy July 910 2009 Proceedings” Metadata:
- Title: ➤ Detection Of Intrusions And Malware And Vulnerability Assessment 6th International Conference Dimva 2009 Como Italy July 910 2009 Proceedings
- Author: Ulrich Flegel
- Publisher: Springer
- Publish Date: 2009
“Detection Of Intrusions And Malware And Vulnerability Assessment 6th International Conference Dimva 2009 Como Italy July 910 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Computer networks - Information Systems - Data encryption (Computer science) - Data protection - Computer science - Computers - Congresses - Access control - Evaluation - Security measures - Computer security - Malware (Computer software) - Eindringerkennung - Kongress - Kryptoanalyse - Malware - Softwareschwachstelle - Zugriffskontrolle - Computers, access control - Computer networks, security measures - Malware (computer software)
Edition Identifiers:
- The Open Library ID: OL26078633M
- Online Computer Library Center (OCLC) ID: 427321477
- Library of Congress Control Number (LCCN): 2009933175
- All ISBNs: 3642029175 - 9783642029172
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Detection Of Intrusions And Malware And Vulnerability Assessment 6th International Conference Dimva 2009 Como Italy July 910 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Privatsphäre durch die Delegation von Rechten
By Sven Wohlgemuth

“Privatsphäre durch die Delegation von Rechten” Metadata:
- Title: ➤ Privatsphäre durch die Delegation von Rechten
- Author: Sven Wohlgemuth
- Language: ger
- Number of Pages: Median: 190
- Publisher: ➤ Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Vieweg + Teubner in GWV Fachverl.
- Publish Date: 2009
- Publish Location: Wiesbaden
“Privatsphäre durch die Delegation von Rechten” Subjects and Themes:
- Subjects: ➤ Privatsphäre - Personenbezogene Daten - Identitätsverwaltung - Zugriffskontrolle - Datenschutz - Datenübermittlung
Edition Identifiers:
- The Open Library ID: OL37148315M - OL27082705M
- Online Computer Library Center (OCLC) ID: 316195213
- All ISBNs: 3834893080 - 3834807214 - 9783834893086 - 9783834807212
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Privatsphäre durch die Delegation von Rechten at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Intelligence And Security Informatics Pacific Asia Workshop Paisi 2009 Bangkok Thailand April 27 2009 Proceedings
By Christopher C. Yang

“Intelligence And Security Informatics Pacific Asia Workshop Paisi 2009 Bangkok Thailand April 27 2009 Proceedings” Metadata:
- Title: ➤ Intelligence And Security Informatics Pacific Asia Workshop Paisi 2009 Bangkok Thailand April 27 2009 Proceedings
- Author: Christopher C. Yang
- Publisher: Springer
- Publish Date: 2009
“Intelligence And Security Informatics Pacific Asia Workshop Paisi 2009 Bangkok Thailand April 27 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Computer science - Data mining - Computer networks - Law and legislation - Computers - Computer security - Internet - Cryptography - Expert systems (Computer science) - Congresses - Electronic surveillance - National security - Business enterprises - Security measures - Data Mining - Kongress - Wissensextraktion - Datensicherung - Zugriffskontrolle - Computerkriminalität - Kryptoanalyse - Computersicherheit - World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - World Wide Web 2.0.
Edition Identifiers:
- The Open Library ID: OL26053624M
- Online Computer Library Center (OCLC) ID: 370603587
- Library of Congress Control Number (LCCN): 2009933164
- All ISBNs: 3642013929 - 9783642013928
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Intelligence And Security Informatics Pacific Asia Workshop Paisi 2009 Bangkok Thailand April 27 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13IT security governance guidebook with security program metrics on CD-ROM
By Frederick B. Cohen
“IT security governance guidebook with security program metrics on CD-ROM” Metadata:
- Title: ➤ IT security governance guidebook with security program metrics on CD-ROM
- Author: Frederick B. Cohen
- Language: English
- Number of Pages: Median: 189
- Publisher: ➤ Auerbach Publications/Taylor & Francis
- Publish Date: 2007
- Publish Location: Boca Raton, FL
“IT security governance guidebook with security program metrics on CD-ROM” Subjects and Themes:
- Subjects: ➤ Security measures - Software measurement - Access control - Computer networks - Computers - Corporate governance - Data processing - Confidential business information - Computer security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Renseignements commerciaux confidentiels - Informatique - Gouvernement d'entreprise - Mesure du logiciel - Computersicherheit - Rechnernetz - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL17157155M
- Online Computer Library Center (OCLC) ID: 870716568
- Library of Congress Control Number (LCCN): 2006048965
- All ISBNs: 0849384354 - 9780849384356
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find IT security governance guidebook with security program metrics on CD-ROM at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Information and communications security
By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

“Information and communications security” Metadata:
- Title: ➤ Information and communications security
- Author: ➤ International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
- Language: English
- Number of Pages: Median: 508
- Publisher: Springer
- Publish Date: 2007
- Publish Location: Berlin - New York
“Information and communications security” Subjects and Themes:
- Subjects: ➤ Telecommunication systems - Datensicherung - Zugriffskontrolle - Computersicherheit - Congresses - Computer security - Authentifikation - Kryptosystem - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Computer science - Computer networks - Computer software - Information networks - Data protection - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL25402688M
- Online Computer Library Center (OCLC) ID: 183257704
- Library of Congress Control Number (LCCN): 2007940029
- All ISBNs: 9783540770473 - 354077047X
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and communications security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

“Identity and privacy in the Internet age” Metadata:
- Title: ➤ Identity and privacy in the Internet age
- Author: ➤ Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
- Language: English
- Number of Pages: Median: 301
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Identity and privacy in the Internet age” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Mobile Computing - Netzwerkschicht - Privatsphäre - Internet - Kryptoanalyse - Eingebettetes System - Computer networks - Trusted Computing - Anwendungssystem - Kongress - Netzwerktopologie - Congresses - Identitätsverwaltung - Computer security - Anonymität - Security measures - Data encryption (Computer science) - Information systems - Coding theory - Data structures (Computer science) - Data protection - Computer science - Internet, security measures
- Places: Oslo <2009>
Edition Identifiers:
- The Open Library ID: OL25040994M
- Online Computer Library Center (OCLC) ID: 465166561
- Library of Congress Control Number (LCCN): 2009935066
- All ISBNs: 3642047653 - 9783642047657
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Identity and privacy in the Internet age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
- Language: English
- Number of Pages: Median: 297
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Softwareschutz - Kongress - Computersicherheit - Rechnernetz - Computer security - Congresses - Elektronische Unterschrift - Authentifikation - Data encryption (computer science)
- Places: Kagawa <2008>
Edition Identifiers:
- The Open Library ID: OL24561243M
- Online Computer Library Center (OCLC) ID: 276332284
- Library of Congress Control Number (LCCN): 2008939387
- All ISBNs: 9783540895978 - 3540895973
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Secure data management
By SDM 2005 (2005 Trondheim, Norway)

“Secure data management” Metadata:
- Title: Secure data management
- Author: ➤ SDM 2005 (2005 Trondheim, Norway)
- Language: English
- Number of Pages: Median: 240
- Publisher: Springer
- Publish Date: 2005
- Publish Location: New York - Berlin
“Secure data management” Subjects and Themes:
- Subjects: ➤ Congresses - Database security - Computers - Access control - Computers, access control - Data mining - Database management - Bases de données - Congrès - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Internet - Security - Networking - General - Informatique - Datenbanksystem - Datensicherung - Datenverwaltung - Geheimnisprinzip - Kryptosystem - Privatsphäre - Zugriffskontrolle - Computer Science - Engineering & Applied Sciences - Base de données - Contrôle d'accès - Ordinateur - Sécurité des données - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL18244804M
- Online Computer Library Center (OCLC) ID: 61430254
- Library of Congress Control Number (LCCN): 2005931521
- All ISBNs: 3540287981 - 9783540287988
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure data management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Privacy enhancing technologies
By PET 2002 (2002 San Francisco, Calif.)

“Privacy enhancing technologies” Metadata:
- Title: Privacy enhancing technologies
- Author: ➤ PET 2002 (2002 San Francisco, Calif.)
- Language: English
- Number of Pages: Median: 238
- Publisher: Springer-Verlag
- Publish Date: 2003
- Publish Location: New York
“Privacy enhancing technologies” Subjects and Themes:
- Subjects: ➤ Congrès - REDES DE COMPUTADORES - Privatsphäre - Internet - CRIPTOLOGIA - Datensicherung - Computer security - Kryptologie - Security measures - Zugriffskontrolle - Electronic Commerce - Mesures - Réseaux d'ordinateurs - SEGURANÇA EM COMPUTADOR - Computer networks - Sécurité informatique - Congresses - Datenschutz - Sécurité - Authentifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL18183564M
- Online Computer Library Center (OCLC) ID: 223630116 - 51553474
- Library of Congress Control Number (LCCN): 2003043439
- All ISBNs: 354000565X - 9783540005650
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy enhancing technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Computer security and protectionstructures
By Bruce J. Walker

“Computer security and protectionstructures” Metadata:
- Title: ➤ Computer security and protectionstructures
- Author: Bruce J. Walker
- Language: English
- Number of Pages: Median: 142
- Publisher: Dowden, Hutchinson & Ross
- Publish Date: 1977
- Publish Location: Stroudsburg, Pa
“Computer security and protectionstructures” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Electonic data processing departments - Security measures - Electronic data processing departments - Zugriffskontrolle - Datensicherung - Contrôle - Ordinateurs - Computersicherheit - Ordinateurs - Accès - Contrôle - Sûreté - Computer - Accès - Computer security - Mesures - Centres de traitement de l'information - Centres de traitement de l'information - Sûreté - Mesures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL22246223M
- Online Computer Library Center (OCLC) ID: 2137259
- Library of Congress Control Number (LCCN): 76011767
- All ISBNs: 9780879332471 - 0879332476
Access and General Info:
- First Year Published: 1977
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security and protectionstructures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Foundations and Practice of Security Lecture Notes in Computer Science
By Pascal Lafourcade

“Foundations and Practice of Security Lecture Notes in Computer Science” Metadata:
- Title: ➤ Foundations and Practice of Security Lecture Notes in Computer Science
- Author: Pascal Lafourcade
- Publisher: Springer
- Publish Date: 2012
“Foundations and Practice of Security Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Computer security - Zugriffskontrolle - RFID - Systèmes informatiques - Computersicherheit - Privatsphäre - Chipkarte - Mesures de sûreté - Chiffrierung - Kryptoanalyse - Rechnernetz - Datensicherung - Formale Methode - Informationssystem - Serviceorientierte Architektur - Congresses - Web Services - Kryptosystem - Kryptologie - Verifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26138614M
- Library of Congress Control Number (LCCN): 2011945035
- All ISBNs: 9783642279003 - 3642279007
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Foundations and Practice of Security Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings
By Noboru Kunihiro

“Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings” Metadata:
- Title: ➤ Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings
- Author: Noboru Kunihiro
- Publisher: Springer
- Publish Date: 2010
“Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Computer software - Data protection - Computer science - Access control - Datensicherung - Computers - Sicherheitsprotokoll - Computersicherheit - Zugriffskontrolle - Rechnernetz - Congresses - Computer security - Kryptologie - Elektronische Unterschrift - Authentifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26086736M
- Library of Congress Control Number (LCCN): 2010937763
- All ISBNs: 9783642168246 - 3642168248
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Computer Security – ESORICS 2009
By Michael Backes

“Computer Security – ESORICS 2009” Metadata:
- Title: ➤ Computer Security – ESORICS 2009
- Author: Michael Backes
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Computer Security – ESORICS 2009” Subjects and Themes:
- Subjects: ➤ Computational complexity - Coding theory - Data protection - Computer science - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Authentifikation - Kongress - Zugriffskontrolle - Kryptologie - Rechnernetz - Computersicherheit - Datensicherung - Privatsphäre - Autorisierung - Kryptoanalyse - Sicherheitsprotokoll - Kryptosystem - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25552065M
- Online Computer Library Center (OCLC) ID: 436030831
- Library of Congress Control Number (LCCN): 2009934436
- All ISBNs: 3642044441 - 9783642044441 - 3642044433 - 9783642044434
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security – ESORICS 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Privacy in Location-Based Applications
By Cláudio Bettini

“Privacy in Location-Based Applications” Metadata:
- Title: ➤ Privacy in Location-Based Applications
- Author: Cláudio Bettini
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Privacy in Location-Based Applications” Subjects and Themes:
- Subjects: ➤ Information storage and retrieval systems - Information Systems - Law and legislation - Computers - Computer science - Data protection - Computer security - Wireless communication systems - Congresses - Access control - Anonymität - Information Retrieval - Kryptoanalyse - Privatsphäre - Standortbezogener Dienst - Ubiquitous Computing - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL25555353M
- Online Computer Library Center (OCLC) ID: 428028311
- Library of Congress Control Number (LCCN): 2009931473
- All ISBNs: 3642035108 - 3642035116 - 9783642035111 - 9783642035104
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy in Location-Based Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Data and applications security and privacy XXIV
By IFIP WG 11.3 Working Conference on Data and Applications Security (24th 2010 Rome, Italy)

“Data and applications security and privacy XXIV” Metadata:
- Title: ➤ Data and applications security and privacy XXIV
- Author: ➤ IFIP WG 11.3 Working Conference on Data and Applications Security (24th 2010 Rome, Italy)
- Language: English
- Number of Pages: Median: 376
- Publisher: Springer
- Publish Date: 2010
- Publish Location: Berlin - New York
“Data and applications security and privacy XXIV” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Database security - Privatsphäre - Abfrageverarbeitung - Congresses - Identitätsverwaltung - Datenbanksystem - Trusted Computing - Computer security - Data protection
- Places: Rom 2010
Edition Identifiers:
- The Open Library ID: OL25313825M
- Online Computer Library Center (OCLC) ID: 644521801
- Library of Congress Control Number (LCCN): 2010928333
- All ISBNs: 9783642137389 - 3642137385
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data and applications security and privacy XXIV at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Advances in information and computer security
By International Workshop on Security (4th 2009 Toyama-shi, Japan)

“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (4th 2009 Toyama-shi, Japan)
- Language: English
- Number of Pages: Median: 227
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Sicherheitsprotokoll - Kongress - Computersicherheit - Rechnernetz - Data encryption (Computer science) - Computer security - Congresses - Elektronische Unterschrift - Authentifikation - Information Systems - Computer science - Computer networks - Operating systems (Computers) - Data protection - Computer software - Data encryption (computer science)
- Places: Toyama <2009>
Edition Identifiers:
- The Open Library ID: OL25337196M
- Online Computer Library Center (OCLC) ID: 449850195
- Library of Congress Control Number (LCCN): 2009935384
- All ISBNs: 3642048455 - 9783642048456
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
- Language: English
- Number of Pages: Median: 297
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Softwareschutz - Kongress - Computersicherheit - Rechnernetz - Computer security - Congresses - Elektronische Unterschrift - Authentifikation
- Places: Kagawa <2008>
Edition Identifiers:
- The Open Library ID: OL24573363M
- Online Computer Library Center (OCLC) ID: 276332284
- Library of Congress Control Number (LCCN): 2008939387
- All ISBNs: 9783540895978 - 3540895973
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings
By Jaideep Vaidya

“Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Metadata:
- Title: ➤ Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings
- Author: Jaideep Vaidya
- Number of Pages: Median: 326
- Publisher: Springer
- Publish Date: 2009
“Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Information Systems - Computer science - Software engineering - Computer networks - Data protection - Computer software - Database security - Congresses - Anwendungssystem - Kongress - Privatsphäre - Datensicherung - Zugriffskontrolle - Datenbanksystem - Abfrage - Rechnernetz - Kryptoanalyse - Systemplattform - Trusted Computing - Electronic data processing, distributed processing - Electronic commerce - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL25969993M
- Online Computer Library Center (OCLC) ID: 427321495
- Library of Congress Control Number (LCCN): 2009929941
- All ISBNs: 9783642030062 - 3642030068
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Information and Communications Security
By ICICS <12, 2010, Barcelona>

“Information and Communications Security” Metadata:
- Title: ➤ Information and Communications Security
- Author: ICICS <12, 2010, Barcelona>
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2004
- Publish Location: Berlin, Heidelberg
“Information and Communications Security” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Trusted Computing - Computersicherheit - Privatsphäre - Kryptosystem - Anonymität - Kryptoanalyse - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27045405M
- Online Computer Library Center (OCLC) ID: 724681708
- All ISBNs: 9783540301912 - 3540301917
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
By Guilin Wang

“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Metadata:
- Title: ➤ Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
- Author: Guilin Wang
- Publisher: Springer
- Publish Date: 2010
“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Coding theory - Computer science - Data protection - Computer networks - Computer software - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Telecommunication systems - Security measures - Authentifikation - Computersicherheit - Datensicherung - Kryptoanalyse - Kryptosystem - Sicherheitsprotokoll - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL26094822M
- Library of Congress Control Number (LCCN): 2009940402
- All ISBNs: 9783642111440 - 3642111440
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Information systems security
By ICISS 2007 (2007 Delhi, India)

“Information systems security” Metadata:
- Title: Information systems security
- Author: ICISS 2007 (2007 Delhi, India)
- Language: English
- Number of Pages: Median: 322
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information systems security” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Anwendungssystem - Datensicherung - Verteiltes System - Zugriffskontrolle - Computersicherheit - Informationssystem - Congresses - Computer security - Kryptosystem - Information networks - Authentifikation - Data encryption (Computer science) - Information storage and retrieval systems - Computer networks - Data protection - Computer science - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25320500M
- Online Computer Library Center (OCLC) ID: 183258016
- Library of Congress Control Number (LCCN): 2007940398
- All ISBNs: 9783540770855 - 3540770852
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information systems security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings
By Sushil Jajodia

“Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings” Metadata:
- Title: ➤ Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings
- Author: Sushil Jajodia
- Publisher: Springer
- Publish Date: 2012
“Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Systems and Data Security - Information organization - Computer networks - Data protection - Information retrieval - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Information storage and retrieval systems - Data Encryption - Data encryption (Computer science) - Computer security - Information networks - Schlüsselverwaltung - Zugriffskontrolle - Computers - Computersicherheit - Privatsphäre - Kryptoanalyse - Access control - Datensicherung - Rechnernetz - Informationssystem - Congresses - Security measures - Authentifikation - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL25993871M
- Library of Congress Control Number (LCCN): 2011941662
- All ISBNs: 9783642255595 - 3642255590
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings
By Indranil Sen Gupta

“Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings” Metadata:
- Title: ➤ Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings
- Author: Indranil Sen Gupta
- Publisher: Springer
- Publish Date: 2010
“Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Computer science - Computer networks - Information storage and retrieval systems - Biometry - Data protection - Data encryption (Computer science) - Computer security - Data encryption (computer science) - Congresses - Information networks - Access control - Computers - Authentifikation - Computersicherheit - Datenbanksystem - Datensicherung - Elektronisches Wasserzeichen - Kryptoanalyse - Kryptologie - Rechnernetz - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL26074360M
- Library of Congress Control Number (LCCN): 2009939539
- All ISBNs: 3642107710 - 9783642107719
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Information Security
By Pierangela Samarati

“Information Security” Metadata:
- Title: Information Security
- Author: Pierangela Samarati
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security” Subjects and Themes:
- Subjects: ➤ Data protection - Computer software - Computer science - Software engineering - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Computersicherheit - Kongress - Datensicherung - Eindringerkennung - Kryptoanalyse - Kryptosystem - Zugriffskontrolle - Authentifikation - Sicherheitsprotokoll - Trusted Computing - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25535918M
- Online Computer Library Center (OCLC) ID: 436029082
- Library of Congress Control Number (LCCN): 2009934111
- All ISBNs: 9783642044748 - 3642044735 - 9783642044731 - 3642044743
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Ad-Hoc, Mobile and Wireless Networks
By Pedro M. Ruíz

“Ad-Hoc, Mobile and Wireless Networks” Metadata:
- Title: ➤ Ad-Hoc, Mobile and Wireless Networks
- Author: Pedro M. Ruíz
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Ad-Hoc, Mobile and Wireless Networks” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Software engineering - Computer networks - Data structures (Computer science) - Computer science - Mobile communication systems - Congresses - Wireless communication systems - Ad hoc networks (Computer networks) - Ad-hoc-Netz - Kongress - Routing - Funknetz - Zugriffskontrolle - Dienstgüte - Mobile Computing - Drahtloses Sensorsystem
Edition Identifiers:
- The Open Library ID: OL25536259M
- Online Computer Library Center (OCLC) ID: 436030822
- Library of Congress Control Number (LCCN): 2009934010
- All ISBNs: 3642043828 - 3642043836 - 9783642043833 - 9783642043826
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ad-Hoc, Mobile and Wireless Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
By Willem Jonker

“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Metadata:
- Title: ➤ Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
- Author: Willem Jonker
- Publisher: Springer
- Publish Date: 2009
“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Database management - Information storage and retrieval systems - Computer network architectures - Computer science - Authentication - Congresses - Computer security - Datenbanksystem - Kongress - Datensicherung - Datenverwaltung - Privatsphäre - Trusted Computing - Zugriffskontrolle - Authentifikation
Edition Identifiers:
- The Open Library ID: OL25995094M
- Online Computer Library Center (OCLC) ID: 436029042
- Library of Congress Control Number (LCCN): 2009933478
- All ISBNs: 364204218X - 9783642042188
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

“Identity and privacy in the Internet age” Metadata:
- Title: ➤ Identity and privacy in the Internet age
- Author: ➤ Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
- Language: English
- Number of Pages: Median: 301
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Identity and privacy in the Internet age” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Mobile Computing - Netzwerkschicht - Privatsphäre - Internet - Kryptoanalyse - Eingebettetes System - Computer networks - Trusted Computing - Anwendungssystem - Kongress - Netzwerktopologie - Congresses - Identitätsverwaltung - Computer security - Anonymität - Security measures
- Places: Oslo <2009>
Edition Identifiers:
- The Open Library ID: OL25040995M
- Online Computer Library Center (OCLC) ID: 465166561
- Library of Congress Control Number (LCCN): 2009935066
- All ISBNs: 3642047653 - 9783642047657
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Identity and privacy in the Internet age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Sicherheitskonzepte im WWW
By Stefan Nusser

“Sicherheitskonzepte im WWW” Metadata:
- Title: Sicherheitskonzepte im WWW
- Author: Stefan Nusser
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 1998
- Publish Location: Berlin, Heidelberg
“Sicherheitskonzepte im WWW” Subjects and Themes:
- Subjects: ➤ World Wide Web - Zugriffskontrolle - Datensicherung - IP - Kryptologie - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27087490M
- Online Computer Library Center (OCLC) ID: 863805970
- All ISBNs: 3642804748 - 9783642804748
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Sicherheitskonzepte im WWW at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssystemen
By Zolta n. Nochta

“Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssystemen” Metadata:
- Title: ➤ Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssystemen
- Author: Zolta n. Nochta
- Language: ger
- Publisher: Univ.-Verl.
- Publish Date: 2004
- Publish Location: Karlsruhe
“Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssystemen” Subjects and Themes:
- Subjects: Informationssystem - Verteiltes System - Digitales Zertifikat - Autorisierung - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL25566829M
- Online Computer Library Center (OCLC) ID: 76657928
- All ISBNs: 9783937300306 - 3937300309
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssystemen at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Privacy enhancing technologies

“Privacy enhancing technologies” Metadata:
- Title: Privacy enhancing technologies
- Language: English
- Number of Pages: Median: 239
- Publisher: Springer
- Publish Date: 2003
“Privacy enhancing technologies” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Electronic Commerce - Congrès - REDES DE COMPUTADORES - Privatsphäre - Réseaux d'ordinateurs - Internet - SEGURANÇA EM COMPUTADOR - CRIPTOLOGIA - Datensicherung - Computer networks - Security measures - Sécurité informatique - Congresses - Computer security - Mesures - Kryptologie - Datenschutz - Sécurité - Authentifikation - SEGURANÇA EM COMPUTADOR - Réseaux d'ordinateurs - Sécurité informatique - Privatsphäre
Edition Identifiers:
- The Open Library ID: OL9053821M
- Library of Congress Control Number (LCCN): 2003043439
- All ISBNs: 9783540005650 - 354000565X
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Privacy enhancing technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.