153316 |
|
Cabrera E., Vela A. |
Security of Water Supply Systems |
2006 | •• |
165297 |
|
Hetland J., Gochitashvili T. |
Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) |
2004 | •• |
195994 |
|
M. Obaidat, N.Boudriga |
Security of e-Systems and Computer Networks |
2007 | •• |
80683 |
|
Halleen G., Kellogg G. |
Security Monitoring with Cisco Security MARS |
2007 | •• |
166434 |
|
Tsai J., Ma L. |
Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) |
2006 | •• |
133783 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
139590 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
29606 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) |
2007 | •• |
58695 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt |
2007 | •• |
136026 |
|
Gerald L. Kovacich, Edward Halibozek |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2005 • | •• |
139364 |
|
Kovacich G., Halibozek E. |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2006 | •• |
56788 |
|
Duffie D. |
Security Markets. Stochastic Models |
1988 | •• |
24830 |
|
Babbin J., Carter E.F. |
Security Log Management: Identifying Patterns in the Chaos |
2006 | •• |
29394 |
|
Butler C., Fuller E., Rogers J.A. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
31415 |
|
Butler Ch., Rogers R., Hurley Ch. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
140775 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management Implementation |
2010 | •• |
191999 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management (SIEM) Implementation (Network Pro Library) |
2011 | •• |
132054 |
|
Gal C.S., Kantor P.B. |
Security Informatics and Terrorism |
2007 | •• |
24829 |
|
Hardjono Th., Dondeti L.R. |
Security in Wireless LANs and MANs |
2005 | •• |
60556 |
|
Yang Xiao |
Security in Sensor Networks |
2007 | •• |
167640 |
|
Clark I., Paige R., Polack F. |
Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings |
2006 | •• |
160005 |
|
Hutter D., Ullmann M. |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings |
2005 | •• |
146052 |
|
Dieter Hutter, Stephan W. |
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers |
2004 | •• |
28372 |
|
Weippl E.R. |
Security in e-learning |
2005 | •• |
26400 |
|
Xiao Y. |
Security in Distributed, Grid, Mobile, and Pervasive Computing |
2007 | •• |
186924 |
|
Fan C., Thampi S., Atrey P. |
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings |
2013 | •• |
17420 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2006 • | •• |
19503 |
|
Pfleeger C.P., Pfleeger S.L. |
Security in Computing |
2002 • | •• |
78427 |
|
Blundo C., Cimato S. |
Security in Communication Networks, 4 conf., SCN 2004 |
2005 • | •• |
141123 |
|
Cimato S., Galdi C., Persiano G. |
Security in Communication Networks |
2003 | •• |
196308 |
|
V. Hassler |
Security Fundamentals for E-Commerce (Artech House Computer Security Series) |
2002 | •• |
29601 |
|
Anjum F., Mouchtaris P. |
Security for Wireless Ad-hoc Networks |
2007 | •• |
80260 |
|
Bertino E., Martino L.M., Paci F. |
Security for web services and service-oriented architectures |
2010 | •• |
133348 |
|
Aissi S., Dabbous N., Prasad A. |
Security for Mobile Networks and Platforms |
2006 | •• |
172553 |
|
Rountree D. |
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts |
2010 | •• |
22961 |
|
Robinson E., Bond M.J. |
Security for Microsoft Visual Basic .NET |
2003 | •• |
79109 |
|
Schumacher M. |
Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) |
2003 | •• |
183361 |
|
Chen J., Miyaji A., Cuzzocrea A. |
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings |
2013 | •• |
143772 |
|
Herrmann D. |
Security Engineering and Information Assurance |
2002 | •• |
13945 |
|
Brewer D.C. |
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access |
2006 | •• |
75533 |
|
Sennewald C. A. |
Security Consulting |
2004 • | •• |
217275 |
|
Lunkeit A., Zimmer W. |
Security by Design: Security Engineering informationstechnischer Systeme |
n/a | •• |
23162 |
|
Dykstra T., Fuller E., Miles G. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 | •• |
76478 |
|
Rogers R., Miles G., Fuller E. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 • | •• |
24828 |
|
Cranor L.F., Garfinkel S. |
Security and Usability: Designing Secure Systems that People Can Use |
2005 | •• |
184091 |
|
Delakouridis C., Anagnostopoulos C., Accorsi R. |
Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings |
2013 | •• |
55586 |
|
Adomi E.E. |
Security and Software for Cybercafes |
2008 | •• |
178299 |
|
Schmidt F., Russello G., Lioy A. |
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) |
2010 | •• |
135627 |
|
Lian S. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
173985 |
|
Lian S., Schmidt A. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |