Refine your search
Availability
-
Authors
- Asokan, N... [et al.... (1)
- Bertino, Elisa (1)
- Chen, Xiaofeng (1)
- Dey, Bikash Kumar (1)
- Garfinkel, Simson (1)
- Gasakis, Mele (1)
- Katz, Jonathan (4)
- Kohnke, Anne (1)
- Larsen, Per... [et a... (1)
- Lee, Ruby B. (1)
- Lipford, Heather Ric... (1)
- Pasareanu, Corina S. (1)
- Pelc, Andrzej (1)
- Petit, Franck (1)
- Prabhakaran, Vinod M... (1)
- Robshaw, Matthew (4)
- Schmidt, Max (1)
- Stallings, William (1)
- Szefer, Jakub (1)
- Wachsmann, Christian (1)
- Show more
- Show less
-
Item types
- Books (3)
- E-Books (18)
- Theses and Dissertations (1)
-
Locations
-
Series
-
Topics
- Computer security (4)
- Anomaly detection (C... (1)
- Authentication (2)
- Coding theory (2)
- Computer architectur... (2)
- Computer communicati... (2)
- Computer logic (2)
- Computer networks (4)
- Computer science (4)
- Computer Science and... (4)
- Computer security (17)
- Cryptography (2)
- Data encryption (Com... (4)
- Data encryption(Comp... (4)
- Data protection (3)
- Database security (1)
- Information technolo... (2)
- Intrusion detection ... (1)
- Management informati... (2)
- Outsourcing paradigm (1)
- Show more
- Show less