Books by Unknown Author

Cover of Encyclopedia of Cryptography, Security and Privacy

Encyclopedia of Cryptography, Security and Privacy

2022

Cover of Encyclopedia of Cryptography, Security and Privacy

Encyclopedia of Cryptography, Security and Privacy

2022

Cover of Adaptive Autonomous Secure Cyber Systems

Adaptive Autonomous Secure Cyber Systems

2021

Cover of Network Security Metrics

Network Security Metrics

2018

Cover of Secure Cloud Computing

Secure Cloud Computing

2016

Cover of Graphical Models for Security

Graphical Models for Security

2016

Cover of Cyber Deception

Cyber Deception

2016

Cover of Cyber Warfare

Cyber Warfare

2015

Cover of Information Security Theory and Practice

Information Security Theory and Practice

2015

Cover of Secure Cloud Computing

Secure Cloud Computing

2014

Cover of Network Hardening

Network Hardening

2014

Cover of ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

2014

Cover of ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

2014

Cover of Moving Target Defense

Moving Target Defense

2013

Cover of Moving Target Defense II

Moving Target Defense II

2013

Cover of Database Security XII

Database Security XII

2013

Cover of Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11. 5 Second Working Conference on Integrity and Internal Control in Information Systems

Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11. 5 Second Working Conference on Integrity and Internal Control in Information Systems

2013

Cover of Trusted Recovery and Defensive Information Warfare

Trusted Recovery and Defensive Information Warfare

2013

Cover of Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013

2013

Cover of Time Granularities in Databases, Data Mining, and Temporal Reasoning

Time Granularities in Databases, Data Mining, and Temporal Reasoning

2013

Cover of Information Hiding : Steganography and Watermarking-Attacks and Countermeasures

Information Hiding : Steganography and Watermarking-Attacks and Countermeasures

2012

Cover of Moving target defense

Moving target defense

2011

Cover of Information Systems Security

Information Systems Security

2011

Cover of Cyber situational awareness

Cyber situational awareness

2010

Cover of Handbook of database security

Handbook of database security

2010

Cover of Data and Applications Security and Privacy XXIV

Data and Applications Security and Privacy XXIV

2010

Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

2010

Cover of Journal on Data Semantics II

Journal on Data Semantics II

2005

Cover of Data and Applications Security XIX

Data and Applications Security XIX

2005

Cover of Information Systems Security

Information Systems Security

2005

Cover of Integrity and Internal Control in Information Systems VI

Integrity and Internal Control in Information Systems VI

2004

Cover of Intrusion Detection in Distributed Systems

Intrusion Detection in Distributed Systems

2003

Cover of Advances in Multimedia Information Systems

Advances in Multimedia Information Systems

2003

Cover of Information Hiding

Information Hiding

2000

Cover of Time Granularities in Databases, Data Mining, and Temporal Reasoning

Time Granularities in Databases, Data Mining, and Temporal Reasoning

2000

Cover of Advanced Transaction Models and Architectures

Advanced Transaction Models and Architectures

1997

Cover of Integrity and Internal Control in Information Systems

Integrity and Internal Control in Information Systems

1997

Books by Unknown Author - BookOwl | BookOwl