172553 |
|
Rountree D. |
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts |
2010 | •• |
133348 |
|
Aissi S., Dabbous N., Prasad A. |
Security for Mobile Networks and Platforms |
2006 | •• |
80260 |
|
Bertino E., Martino L.M., Paci F. |
Security for web services and service-oriented architectures |
2010 | •• |
29601 |
|
Anjum F., Mouchtaris P. |
Security for Wireless Ad-hoc Networks |
2007 | •• |
196308 |
|
V. Hassler |
Security Fundamentals for E-Commerce (Artech House Computer Security Series) |
2002 | •• |
141123 |
|
Cimato S., Galdi C., Persiano G. |
Security in Communication Networks |
2003 | •• |
78427 |
|
Blundo C., Cimato S. |
Security in Communication Networks, 4 conf., SCN 2004 |
2005 • | •• |
17420 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2006 • | •• |
19503 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2002 • | •• |
186924 |
|
Fan C., Thampi S., Atrey P. |
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings |
2013 | •• |
26400 |
|
Xiao Y. |
Security in Distributed, Grid, Mobile, and Pervasive Computing |
2007 | •• |
28372 |
|
Weippl E.R. |
Security in e-learning |
2005 | •• |
146052 |
|
Dieter Hutter, Stephan W. |
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers |
2004 | •• |
160005 |
|
Hutter D., Ullmann M. |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings |
2005 | •• |
167640 |
|
Clark I., Paige R., Polack F. |
Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings |
2006 | •• |
60556 |
|
Yang Xiao |
Security in Sensor Networks |
2007 | •• |
24829 |
|
Hardjono Th., Dondeti L.R. |
Security in Wireless LANs and MANs |
2005 | •• |
132054 |
|
Gal C.S., Kantor P.B. |
Security Informatics and Terrorism |
2007 | •• |
191999 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management (SIEM) Implementation (Network Pro Library) |
2011 | •• |
140775 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management Implementation |
2010 | •• |
29394 |
|
Butler C., Fuller E., Rogers J.A. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
31415 |
|
Butler Ch., Rogers R., Hurley Ch. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
24830 |
|
Babbin J., Carter E.F. |
Security Log Management: Identifying Patterns in the Chaos |
2006 | •• |
56788 |
|
Duffie D. |
Security Markets. Stochastic Models |
1988 | •• |
136026 |
|
Gerald L. Kovacich, Edward Halibozek |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2005 • | •• |
139364 |
|
Kovacich G., Halibozek E. |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2006 | •• |
58695 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt |
2007 | •• |
29606 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) |
2007 | •• |
133783 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
139590 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
166434 |
|
Tsai J., Ma L. |
Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) |
2006 | •• |
80683 |
|
Halleen G., Kellogg G. |
Security Monitoring with Cisco Security MARS |
2007 | •• |
195994 |
|
M. Obaidat, N.Boudriga |
Security of e-Systems and Computer Networks |
2007 | •• |
165297 |
|
Hetland J., Gochitashvili T. |
Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) |
2004 | •• |
153316 |
|
Cabrera E., Vela A. |
Security of Water Supply Systems |
2006 | •• |
189392 |
|
Poweski B., Raphael D. |
Security on Rails |
2009 | •• |
127041 |
|
Poweski B., Raphael D. |
Security on Rails (The Pragmatic Programmers) |
2009 | •• |
24302 |
|
Schumacher M., Fernandez-Buglioni E., Hybertson D. |
Security Patterns Integrating Security and Systems Engineering |
2006 | •• |
27476 |
|
Maiwald E., Sieglein W. |
Security Planning and Disaster Recovery |
2002 | •• |
30073 |
|
Bryan B., Killion D., Lynn M. |
Security Power Tools |
2007 | •• |
134352 |
|
Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) |
Security Privacy - Silver Linings in the Cloud |
2010 | •• |
158310 |
|
Christianson B., Crispo B., Malcolm J. |
Security Protocols |
2010 | •• |
80549 |
|
Christianson B.(ed.), Crispo B.(ed.), Malcolm J.A.(ed.) |
Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers |
2004 • | •• |
80551 |
|
Christianson B.(ed.), Crispo B.(ed.), Malcom J.A.(ed.) |
Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers |
2007 | •• |
80452 |
|
Bruce Christianson B.(ed.), Bruno Crispo B.(ed.), Malcolm J.A.(ed.) |
Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings |
2000 • | •• |
78944 |
|
Christianson B., Crispo B. |
Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers |
2005 | •• |
132100 |
|
Lomas M. |
Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings |
1997 | •• |
24831 |
|
Andres S., Kenyon B. |
Security Sage's Guide to Hardening the Network Infrastructure |
2004 | •• |
24500 |
|
Oppliger R. |
Security Technologies for the World Wide Web |
2003 | •• |
155802 |
|
Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang |
Security Technology (Communications in Computer and Information Science, 58) |
2010 • | •• |