Listing 1 - 10 of 140 | << page >> |
Sort by
|
Choose an application
Computer networks --- Computer security --- Réseaux d'ordinateurs --- Sécurité informatique --- Security measures --- Sécurité --- Mesures
Choose an application
Computer security --- Database security --- Data protection --- Telecommunication --- Sécurité informatique --- Bases de données --- Protection de l'information (Informatique) --- Télécommunications --- Security measures --- Sécurité --- Mesures
Choose an application
Computer. Automation --- Law --- Computer security --- Data protection --- Sécurité informatique --- Protection de l'information (Informatique) --- Periodicals. --- Periodicals --- Périodiques --- Systèmes informatiques --- Computer security. --- Sécurité --- Mesures --- Information Technology --- Mathematical Sciences --- Telecommunications Technology --- Information Science and Systems --- Internet --- Mobile Computing --- Software Engineering --- Applied Mathematics --- Communication Networks & Technology --- Computer Science --- Data protection.
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking
Choose an application
Computer security. --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer security --- Security measures --- netwerkbeveiliging --- softwareontwikkeling --- softwarebeveiliging --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Computer networks - Security measures
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Computer security --- Computer networks --- Computers --- Sécurité informatique --- Réseaux d'ordinateurs --- Ordinateurs --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Computer networks -- Access control -- Congresses. --- Computer security -- Congresses. --- Computers -- Access control -- Congresses. --- Electronic books. -- local. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer Science. --- Computer Science, general. --- Informatics --- Science
Choose an application
Computers --- Computer security --- Access control --- Ordinateurs --- Computer security. --- Accès --- Contrôle. --- Access control. --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Security measures --- Computer & Data Security. --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Sécurité informatique --- Contrôle
Choose an application
cybersecurity --- network security --- privacy technology --- malware analysis --- critical infrastructure security --- cryptography --- Computer. Automation --- Computer security --- Sécurité informatique --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Leçon inaugurale prononcée le 10 mars 2011 Chaire dInformatique et sciences numériques Aujourdhui, les questions de sécurité informatique sont omniprésentes, non seulement dans le renseignement militaire mais également dans la finance, le commerce, la gestion de données médicales, les réseaux sociaux et bien dautres cadres. À partir dun exemple de la vie courante, le spam, Martin Abadi aborde des aspects variés de linformatique tels que les protocoles cryptographiques, les modèles de ca--
Computer security --- Electronic data processing departments. --- Computer Science --- Security measures. --- Informatics --- Science --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- cryptographie --- sciences numériques --- informatique --- spam --- sécurité informatique
Choose an application
On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute.
Computer security --- Computers --- Sécurité informatique --- Ordinateurs --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Operating Systems. --- Data Encryption. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Cryptology. --- Sécurité informatique - Congrès --- Ordinateurs - Accès - Contrôle - Congrès
Listing 1 - 10 of 140 | << page >> |
Sort by
|