191999 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management (SIEM) Implementation (Network Pro Library) |
2011 | •• |
132054 |
|
Gal C.S., Kantor P.B. |
Security Informatics and Terrorism |
2007 | •• |
24829 |
|
Hardjono Th., Dondeti L.R. |
Security in Wireless LANs and MANs |
2005 | •• |
60556 |
|
Yang Xiao |
Security in Sensor Networks |
2007 | •• |
167640 |
|
Clark I., Paige R., Polack F. |
Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings |
2006 | •• |
160005 |
|
Hutter D., Ullmann M. |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings |
2005 | •• |
146052 |
|
Dieter Hutter, Stephan W. |
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers |
2004 | •• |
28372 |
|
Weippl E.R. |
Security in e-learning |
2005 | •• |
26400 |
|
Xiao Y. |
Security in Distributed, Grid, Mobile, and Pervasive Computing |
2007 | •• |
186924 |
|
Fan C., Thampi S., Atrey P. |
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings |
2013 | •• |
17420 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2006 • | •• |
19503 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2002 • | •• |
78427 |
|
Blundo C., Cimato S. |
Security in Communication Networks, 4 conf., SCN 2004 |
2005 • | •• |
141123 |
|
Cimato S., Galdi C., Persiano G. |
Security in Communication Networks |
2003 | •• |
196308 |
|
V. Hassler |
Security Fundamentals for E-Commerce (Artech House Computer Security Series) |
2002 | •• |
29601 |
|
Anjum F., Mouchtaris P. |
Security for Wireless Ad-hoc Networks |
2007 | •• |
80260 |
|
Bertino E., Martino L.M., Paci F. |
Security for web services and service-oriented architectures |
2010 | •• |
133348 |
|
Aissi S., Dabbous N., Prasad A. |
Security for Mobile Networks and Platforms |
2006 | •• |
172553 |
|
Rountree D. |
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts |
2010 | •• |
22961 |
|
Robinson E., Bond M.J. |
Security for Microsoft Visual Basic .NET |
2003 | •• |
79109 |
|
Schumacher M. |
Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) |
2003 | •• |
183361 |
|
Chen J., Miyaji A., Cuzzocrea A. |
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings |
2013 | •• |
143772 |
|
Herrmann D. |
Security Engineering and Information Assurance |
2002 | •• |
13945 |
|
Brewer D.C. |
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access |
2006 | •• |
75533 |
|
Sennewald C. A. |
Security Consulting |
2004 • | •• |
23162 |
|
Dykstra T., Fuller E., Miles G. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 | •• |
76478 |
|
Rogers R., Miles G., Fuller E. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 • | •• |
24828 |
|
Cranor L.F., Garfinkel S. |
Security and Usability: Designing Secure Systems that People Can Use |
2005 | •• |
184091 |
|
Delakouridis C., Anagnostopoulos C., Accorsi R. |
Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings |
2013 | •• |
55586 |
|
Adomi E.E. |
Security and Software for Cybercafes |
2008 | •• |
178299 |
|
Schmidt F., Russello G., Lioy A. |
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) |
2010 | •• |
135627 |
|
Lian S. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
173985 |
|
Lian S., Schmidt A. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
135931 |
|
Fischer-Hubner S. |
Security and Privacy in Dynamic Environments |
2006 | •• |
191017 |
|
Sander T. |
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers |
2002 | •• |
28870 |
|
Feigenbaum J. (Ed) |
Security and Privacy in Digital Rights Management |
2003 | •• |
177661 |
|
Jajodia S., Zhou J. |
Security and privacy in communication networks |
2010 | •• |
153377 |
|
Buttyan L., Gligor V., Westhoff D. |
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected |
2006 | •• |
144243 |
|
Molva R., Tsudik G., Westhoff D. |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers |
2005 | •• |
79209 |
|
Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) |
Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings |
2007 | •• |
156994 |
|
Henriques M., Khachani M. |
Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) |
2006 | •• |
158864 |
|
|
Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security |
n/a | •• |
169349 |
|
Serpanos D.N., Giladi R. |
Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) |
2006 | •• |
190750 |
|
Ostrovsky R., Prisco R., Visconti I. |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) |
2008 | •• |
169630 |
|
De Prisco R., Yung M. |
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings |
2006 | •• |
80456 |
|
Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) |
Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings |
2008 | •• |
211035 |
|
Verhagen H.L.E. |
Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca |
2022 | •• |
192345 |
|
Hawker A. |
Security and Control in Information Systems: A Guide for Business and Accounting |
2000 | •• |
164867 |
|
Graham B., Dodd D. |
Security Analysis: Principles and Technique, Second Edition |
1934 | •• |
198286 |
|
Graham B., Dodd D. |
Security Analysis |
1996 • | •• |