Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Computer security")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 10039

  • Page / 402

Export

Selection :

  • and

The professionalisation paths of hackers in IT security : The sociology of a divided identity : La sécurité dans un monde numériqueAURAY, Nicolas; KAMINSKY, Danielle.Annales des télécommunications. 2007, Vol 62, Num 11-12, pp 1312-1326, issn 0003-4347, 15 p.Article

Sécurité des systèmes d'informationLAMMARI, Nadira; CUPPENS, Nora; LALEAU, Régine et al.Ingénierie des systèmes d'information (2001). 2014, Vol 19, Num 6, issn 1633-1311, 111 p.Serial Issue

CYBERCRIME PREVENTION, DETECTION AND RESPONSEAL-NEMRAT, Ameer; S. WEIR, George R.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 2, issn 1751-911X, 81 p.Serial Issue

Protecting Users of the Cyber CommonsLUKASIK, Stephen J.Communications of the ACM. 2011, Vol 54, Num 9, pp 54-61, issn 0001-0782, 8 p.Article

Technology EnhancementALI, Al-Dahoud; JAPHET MTENZI.International journal of internet technology and secured transactions (Print). 2009, Vol 1, Num 3-4, issn 1748-569X, 160 p.Serial Issue

SSTIC 2007 Bet Academic PapersJournal in computer virology. 2008, Vol 4, Num 2, issn 1772-9890, 76 p.Conference Proceedings

Foundational Aspects of SecurityCHATZIKOKOLAKIS, Konstantinos; MÖDERSHEIM, Sebastian ALexander; PALAMIDESSI, Catuscia et al.Journal of computer security. 2014, Vol 22, Num 2, issn 0926-227X, 155 p.Serial Issue

2ND INTERNATIONAL SYMPOSIUM ON SECURE VIRTUAL INFRASTRUCTURESFERSCHA, Alois; PEARSON, Siani.Computer systems science and engineering. 2013, Vol 28, Num 6, issn 0267-6192, 94 p.Serial Issue

Inside Risks The Cybersecurity RiskGARFINKEL, Simson L.Communications of the ACM. 2012, Vol 55, Num 6, pp 29-32, issn 0001-0782, 4 p.Article

SECURITY ENHANCEMENTFREDRICK JAPHET MTENZI; AL-DAHOUD, Ali; AKMAYEVA, Galyna et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 1-2, issn 1748-569X, 202 p.Serial Issue

SECURITY, PRIVACY, AND IDENTIFICATION TECHNOLOGIES IN WIRELESS SENSOR NETWORKSYANG, Ming-Hour; LIU, Jonathan C. L; TSENG, Yu-Chee et al.International journal of security and networks (Print). 2010, Vol 5, Num 1, issn 1747-8405, 78 p.Serial Issue

SSTIC 2007 Special IssueJournal in computer virology. 2008, Vol 4, Num 1, issn 1772-9890, 81 p.Conference Proceedings

Data and applications security XX (20th Annual IFIP WG 11.3 working conference on data and applications security, Sophia Antipolis, France, July 31-August 2, 2006)Damiani, Ernesto; Liu, Peng.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36796-9, 1Vol, X-317 p, isbn 3-540-36796-9Conference Proceedings

Foundations of security analysis and design III (FOSAD 2004/2005 Tutorial lectures)Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-29243-8, 1Vol, VI-272 p, isbn 3-540-29243-8Conference Proceedings

[Selected Papers from the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2012) and the 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012)]RAMASWAMY, Lakshmish; CARMINATI, Barbara; SHIN, Dongwan et al.Computers & security. 2014, Vol 41, issn 0167-4048, 89 p.Serial Issue

Cybercrimes, Secure Emerging Web Environments, and Digital ForensicsANGELOPOULOU, Olga.Information security journal (Print). 2014, Vol 23, Num 4-6, issn 1939-3555, 57 p.Conference Proceedings

Help! Is There a Trustworthy-Systems Doctor in the House?YASINSAC, Alec; IRVINE, Cynthia.IEEE security & privacy. 2013, Vol 11, Num 1, pp 73-77, issn 1540-7993, 5 p.Article

A Comparative Study of CyberattacksHYUN KIM, Seung; WANG, Qiu-Hong; ULLRICH, Johannes B et al.Communications of the ACM. 2012, Vol 55, Num 3, pp 66-73, issn 0001-0782, 8 p.Article

Science of Mission AssuranceMUCCIO, Sarah L; VESTAL, Thomas N. J.Engineering of reconfigurable systems & algorithms. International conferenceWorldComp'2011. 2011, isbn 1-60132-177-5, p. 33Conference Paper

Secure Spontaneous InteractionMAYRHOFER, René; NYBERG, Kaisa; KINDBERG, Tim et al.International journal of security and networks (Print). 2009, Vol 4, Num 1-2, issn 1747-8405, 136 p.Serial Issue

Trust and Identity Management in Mobile and Internet Computing and CommunicationsYAN, Zheng; WANG, Guojun; DENG, Robert H et al.IET information security (Print). 2013, Vol 7, Num 1, issn 1751-8709, 60 p.Serial Issue

The International Source of Innovation for the Information Security and IT Audit ProfessionalCAMENISCH, Jan; FISCHER-HÜBNER, Simone; MURAYAMA, Yuko et al.Computers & security. 2013, Vol 33, issn 0167-4048, 70 p.Serial Issue

RADIO FREQUENCY IDENTIFICATION APPLICATIONS AND NETWORKS SECURITYCHAN YEOB YEUN; MOHAMED JAMAL ZEMERLY; AKMAYEVA, Galyna et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 3-4, issn 1748-569X, 200 p.Serial Issue

Network ForensicsMEMON, Nasir; GOEL, Rajni.International journal of security and networks (Print). 2008, Vol 3, Num 2, pp 80-121, issn 1747-8405, 41 p.Conference Paper

Advances in information and computer security (First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006)Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-47699-7, 1Vol, XIII-438 p, isbn 3-540-47699-7Conference Proceedings

  • Page / 402