Search Results

  1. 181

    Information security : policy, processes, and practices

    Published: M.E. Sharpe, 2008
    Description: ix, 286 pages : illustrations ; 26 cm.
    Book
  2. 182

    Applications of supervised and unsupervised ensemble methods by SpringerLink (Online service), Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications, European Conference on Artificial Intelligence

    Published: Springer, 2009
    Description: 1 online resource (xx, 268 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 183

    Biometrics, computer security systems and artificial intelligence applications by SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xi, 342 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  4. 184

    Computational intelligence in information assurance and security by SpringerLink (Online service)

    Published: Springer, 2007
    Description: 1 online resource (xx, 254 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  5. 185

    Computational methods for counterterrorism by SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource (xviii, 306 pages)
    SpringerLink - Click here for access
    eBook
  6. 186

    Computer security in the 21st century by SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (xi, 268 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  7. 187

    Critical infrastructure protection by IFIP Working Group 11.10 on Critical infrastructure Protection, IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection

    Published: Springer, 2008
    Description: 1 online resource (xx, 394 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook
  8. 188

    Critical infrastructure protection II by IFIP Working Group 11.10 on Critical infrastructure Protection, IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection

    Published: Springer, 2008
    Description: 1 online resource (xviii, 278 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 189

    Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration by SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource (197 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  10. 190
  11. 191

    Information hiding and applications by SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource (x, 227 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  12. 192

    Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings by SpringerLink (Online service), ISPEC 2009

    Published: Springer, 2009
    Description: 1 online resource (xiv, 410 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 193

    Insider attack and cyber security : beyond the hacker by SpringerLink (Online service), Workshop on Insider Attack and Cyber Security

    Published: Springer, 2008
    Description: 1 online resource (xi, 222 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 194

    Intelligence and Security Informatics : Techniques and Applications by SpringerLink (Online service)

    Published: Springer-Verlag, 2008
    Description: 1 online resource (xiii, 460 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  15. 195

    Intelligent multimedia data hiding : new directions by SpringerLink (Online service)

    Published: Springer, 2007
    Description: 1 online resource (xvi, 400 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 196

    Intrusion detection systems by SpringerLink (Online service)

    Published: Springer, 2008
    Description: 1 online resource (xiii, 249 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  17. 197

    Machine learning and data mining for computer security : methods and applications by SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xvi, 210 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  18. 198

    Machine learning in cyber trust : security, privacy, and reliability by SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource (xvi, 362 pages) : illustrations (some color)
    SpringerLink - Click here for access
    eBook
  19. 199

    Malware detection by SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xi, 311 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  20. 200

    Managing cyber threats : issues, approaches, and challenges by SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (xvii, 330 pages) : illustrations.
    SpringerLink - Click here for access
    eBook