Search Results
-
181
Information security : policy, processes, and practices
Published: M.E. Sharpe, 2008Description: ix, 286 pages : illustrations ; 26 cm.Book -
182
Applications of supervised and unsupervised ensemble methods
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (xx, 268 pages) : illustrations (some color).
Conference Proceeding eBook -
183
Biometrics, computer security systems and artificial intelligence applications
Published: Springer, 2006SpringerLink - Click here for accessDescription: 1 online resource (xi, 342 pages) : illustrations.
eBook -
184
Computational intelligence in information assurance and security
Published: Springer, 2007SpringerLink - Click here for accessDescription: 1 online resource (xx, 254 pages) : illustrations.
eBook -
185
Computational methods for counterterrorism
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (xviii, 306 pages)
eBook -
186
Computer security in the 21st century
Published: Springer, 2005SpringerLink - Click here for accessDescription: 1 online resource (xi, 268 pages) : illustrations.
eBook -
187
Critical infrastructure protection
Published: Springer, 2008SpringerLink - Click here for accessDescription: 1 online resource (xx, 394 pages) : illustrations.
Conference Proceeding eBook -
188
Critical infrastructure protection II
Published: Springer, 2008SpringerLink - Click here for accessDescription: 1 online resource (xviii, 278 pages) : illustrations.
Conference Proceeding eBook -
189
Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (197 pages) : illustrations.
eBook -
190
Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (viii, 338 pages) : illustrations.
Conference Proceeding eBook -
191
Information hiding and applications
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (x, 227 pages) : illustrations (some color).
eBook -
192
Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (xiv, 410 pages) : illustrations.
Conference Proceeding eBook -
193
Insider attack and cyber security : beyond the hacker
Published: Springer, 2008SpringerLink - Click here for accessDescription: 1 online resource (xi, 222 pages) : illustrations.
Conference Proceeding eBook -
194
Intelligence and Security Informatics : Techniques and Applications
Published: Springer-Verlag, 2008SpringerLink - Click here for accessDescription: 1 online resource (xiii, 460 pages) : illustrations.
eBook -
195
Intelligent multimedia data hiding : new directions
Published: Springer, 2007SpringerLink - Click here for accessDescription: 1 online resource (xvi, 400 pages) : illustrations.
eBook -
196
Intrusion detection systems
Published: Springer, 2008SpringerLink - Click here for accessDescription: 1 online resource (xiii, 249 pages) : illustrations.
eBook -
197
Machine learning and data mining for computer security : methods and applications
Published: Springer, 2006SpringerLink - Click here for accessDescription: 1 online resource (xvi, 210 pages) : illustrations.
eBook -
198
Machine learning in cyber trust : security, privacy, and reliability
Published: Springer, 2009SpringerLink - Click here for accessDescription: 1 online resource (xvi, 362 pages) : illustrations (some color)
eBook -
199
Malware detection
Published: Springer, 2006SpringerLink - Click here for accessDescription: 1 online resource (xi, 311 pages) : illustrations.
eBook -
200
Managing cyber threats : issues, approaches, and challenges
Published: Springer, 2005SpringerLink - Click here for accessDescription: 1 online resource (xvii, 330 pages) : illustrations.
eBook