Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Computers --- Information networks --- Access control --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- User interfaces (Computer systems). --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- User Interfaces and Human Computer Interaction. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
Computer security --- Computers --- Sécurité informatique --- Ordinateurs --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Information storage and retrieva. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.
Computer security --- Information networks --- Computers --- Computer Science --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computers --- Access control
Choose an application
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computers --- Access control
Choose an application
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computers --- Access control
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.
Computer security --- Computers --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security. --- Computer Communication Networks. --- Information storage and retrieva. --- Information Systems. --- Biometrics. --- Data encryption (Computer science). --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Management information systems. --- Computer science. --- Biometrics (Biology). --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Statistical methods --- Communication systems --- Distributed processing
Listing 1 - 7 of 7 |
Sort by
|