24827 |
|
Koconis D., Murray J. |
Securing Linux: A Survival Guide for Linux Security |
2003 | •• |
27172 |
|
Brotzman L. (Ed), Ranch D. (Ed) |
Securing Linux Step by Step |
1999 | •• |
152846 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
176725 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
76131 |
|
Piccard P.L. |
Securing IM and P2P Applications for the Enterprise |
2005 | •• |
142565 |
|
Lukszo Z., Deconinck G., Weijnen M. |
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) |
2010 | •• |
10181 |
|
|
Securing data on the Web |
2001 | •• |
29588 |
|
Macaulay T. |
Securing Converged IP Networks: New Requirements for ICT Security and Assurance |
2006 | •• |
14041 |
|
|
Securing Cisco IOS Networks |
2004 | •• |
26918 |
|
Mourani G. |
Securing and Optimizing Red Hat Linux |
2000 | •• |
27173 |
|
Mourani G. |
Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition |
2000 | •• |
28370 |
|
Davis P.T. |
Securing and controlling Cisco routers |
2002 | •• |
30084 |
|
Wells Ch. |
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web |
2007 | •• |
158158 |
|
Information Security |
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security) |
2008 | •• |
21475 |
|
Seagren E., Noonan W.J. (ed.) |
Secure Your Network for Free |
2007 | •• |
20791 |
|
Eastlake D.E., Niles K. |
Secure XML: The New Syntax for Signatures and Encryption |
2002 | •• |
169524 |
|
Chen Q., Zhang C., Zhang S. |
Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science / Programming and Software Engineering) |
2008 | •• |
77976 |
|
Chen Q. |
Secure Transaction Protocol Analysis: Models and Applications |
2008 | •• |
29587 |
|
Jurjens J. |
Secure Systems Development with UML |
2004 | •• |
26497 |
|
Goransson P., Greenlaw R. |
Secure Roaming in 802.11 Networks |
2007 | •• |
26382 |
|
Chess B., West J., McGraw G. |
Secure Programming with Static Analysis |
2007 | •• |
152881 |
|
Wheeler D. |
Secure programming with Linux and Unix HOWTO |
2003 | •• |
112164 |
|
Wheeler D.A. |
Secure Programming for Linux and Unix HOWTO |
2003 | •• |
13930 |
|
Messier M., Viega J. |
Secure Programming Cookbook for C and C++ |
2003 | •• |
26967 |
|
Galic M. |
Secure Portal: Using Websphere Portal V5 and Tivoli Access Manager V4.1 |
2003 | •• |
23484 |
|
Kabir M.J. |
Secure PHP Development: Building 50 Practical Applications |
2003 | •• |
149554 |
|
Baumgart R. |
Secure Networking - CQRE (Secure) '99: International Exhibition and Congress D?sseldorf, Germany, November 30 - December 2, 1999, Proceedings |
1999 | •• |
193251 |
|
Onieva J., Zhou J. |
Secure Multi-Party Non-Repudiation Protocols and Applications |
2009 • | •• |
160462 |
|
Burmester M., Yasinsac A. |
Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers |
2006 | •• |
23350 |
|
Robichaux R. |
Secure Messaging with Microsoft Exchange Server 2003 |
2004 | •• |
30083 |
|
Robichaux P. |
Secure Messaging with Microsoft Exchange Server 2000 |
2003 • | •• |
127566 |
|
Poovendran R., Wang C., Roy S. |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks |
2007 | •• |
133763 |
|
Choo R. |
Secure Key Establishment |
2008 | •• |
139560 |
|
Choo K. |
Secure Key Establishment |
2009 | •• |
188726 |
|
Nielson H., Gollmann D. |
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings |
2013 | •• |
186348 |
|
Taha S., Shen X. |
Secure IP Mobility Management for VANET |
2013 | •• |
180341 |
|
Vitek J., Jensen C. |
Secure Internet Programming |
1999 | •• |
187252 |
|
Ogiela M., Ogiela U. |
Secure Information Management Using Linguistic Threshold Approach |
2014 | •• |
212394 |
|
Purser M. |
Secure Data Networking |
1993 | •• |
191782 |
|
Jonker W., Petkovic M. |
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science) |
2005 | •• |
150162 |
|
Willem Jonker, Milan Petkovic |
Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings |
2006 • | •• |
169220 |
|
Jonker W., Petkovic M. |
Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings |
2005 | •• |
139591 |
|
Jonker W., Petkovic M. |
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings (Lecture Notes in Computer Science Information Systems and Applications, incl. Internet Web, and HCI) |
2010 | •• |
133785 |
|
Jonker W., Petkovic M. |
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings |
2010 | •• |
159121 |
|
Jonker W., Petkovic M. |
Secure Data Management: 7th VLDB Workshop, SDM 2010 |
2010 • | •• |
163909 |
|
Jonker W., Petkovic M. |
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Lecture Notes in Computer Science) |
2008 | •• |
81681 |
|
Goos G. (Editor), Hartmanis J. (Editor), van Leeuwen J. (Editor) |
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings |
2008 • | •• |
85676 |
|
Jonker W., Petković M. |
Secure Data Management: 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings |
2007 | •• |
195757 |
|
Ting Yu (Editor), Sushil Jajodia (Editor) |
Secure Data Management in Decentralized Systems (Advances in Information Security) |
2006 | •• |
30082 |
|
Yu T. (Ed), Jajodia S. (Ed) |
Secure Data Management in Decentralized Systems |
2006 | •• |