10181 |
|
|
Securing data on the Web |
2001 | •• |
142565 |
|
Lukszo Z., Deconinck G., Weijnen M. |
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) |
2010 | •• |
76131 |
|
Piccard P.L. |
Securing IM and P2P Applications for the Enterprise |
2005 | •• |
152846 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
176725 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
27172 |
|
Brotzman L. (Ed), Ranch D. (Ed) |
Securing Linux Step by Step |
1999 | •• |
24827 |
|
Koconis D., Murray J. |
Securing Linux: A Survival Guide for Linux Security |
2003 | •• |
12484 |
|
Krutz R.L. |
Securing SCADA Systems |
2005 | •• |
55304 |
|
Kizza F.M. |
Securing the Information Infrastructure |
2007 | •• |
166109 |
|
Kizza J., Kizza F. |
Securing the Information Infrastructure |
2008 | •• |
58051 |
|
Ness L. |
Securing Utility and Energy Infrastructures |
2006 | •• |
29589 |
|
Thermos P., Takanen A. |
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures |
2007 | •• |
22962 |
|
Rosenberg J., Remy D. |
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption |
2004 | •• |
26602 |
|
Shawgo J. |
Securing Windows 2000 Step-by-Step, Vol. 5 |
2001 | •• |
19457 |
|
Danseglio M. |
Securing Windows Server 2003 |
2004 | •• |
152503 |
|
Liu R., Trappe W. |
Securing Wireless Communications at the Physical Layer |
2009 | •• |
24022 |
|
Held J. |
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User |
2003 | •• |
13287 |
|
Abelar G. |
Securing Your Business with Cisco ASA and PIX Firewalls |
2005 | •• |
29673 |
|
Miller D.R., Gregg M. |
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills |
2007 | •• |
198286 |
|
Graham B., Dodd D. |
Security Analysis |
1996 • | •• |
164867 |
|
Graham B., Dodd D. |
Security Analysis: Principles and Technique, Second Edition |
1934 | •• |
192345 |
|
Hawker A. |
Security and Control in Information Systems: A Guide for Business and Accounting |
2000 | •• |
211035 |
|
Verhagen H.L.E. |
Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca |
2022 | •• |
80456 |
|
Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) |
Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings |
2008 | •• |
169630 |
|
De Prisco R., Yung M. |
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings |
2006 | •• |
190750 |
|
Ostrovsky R., Prisco R., Visconti I. |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) |
2008 | •• |
169349 |
|
Serpanos D.N., Giladi R. |
Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) |
2006 | •• |
158864 |
|
|
Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security |
n/a | •• |
156994 |
|
Henriques M., Khachani M. |
Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) |
2006 | •• |
79209 |
|
Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) |
Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings |
2007 | •• |
144243 |
|
Molva R., Tsudik G., Westhoff D. |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers |
2005 | •• |
153377 |
|
Buttyan L., Gligor V., Westhoff D. |
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected |
2006 | •• |
177661 |
|
Jajodia S., Zhou J. |
Security and privacy in communication networks |
2010 | •• |
28870 |
|
Feigenbaum J. (Ed) |
Security and Privacy in Digital Rights Management |
2003 | •• |
191017 |
|
Sander T. |
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers |
2002 | •• |
135931 |
|
Fischer-Hubner S. |
Security and Privacy in Dynamic Environments |
2006 | •• |
135627 |
|
Lian S. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
173985 |
|
Lian S., Schmidt A. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
178299 |
|
Schmidt F., Russello G., Lioy A. |
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) |
2010 | •• |
55586 |
|
Adomi E.E. |
Security and Software for Cybercafes |
2008 | •• |
184091 |
|
Delakouridis C., Anagnostopoulos C., Accorsi R. |
Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings |
2013 | •• |
24828 |
|
Cranor L.F., Garfinkel S. |
Security and Usability: Designing Secure Systems that People Can Use |
2005 | •• |
23162 |
|
Dykstra T., Fuller E., Miles G. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 | •• |
76478 |
|
Rogers R., Miles G., Fuller E. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 • | •• |
75533 |
|
Sennewald C. A. |
Security Consulting |
2004 • | •• |
13945 |
|
Brewer D.C. |
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access |
2006 | •• |
143772 |
|
Herrmann D. |
Security Engineering and Information Assurance |
2002 | •• |
183361 |
|
Chen J., Miyaji A., Cuzzocrea A. |
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings |
2013 | •• |
79109 |
|
Schumacher M. |
Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) |
2003 | •• |
22961 |
|
Robinson E., Bond M.J. |
Security for Microsoft Visual Basic .NET |
2003 | •• |