Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Seguridad informatica")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 9565

  • Page / 383

Export

Selection :

  • and

Trust and Identity Management in Mobile and Internet Computing and CommunicationsYAN, Zheng; WANG, Guojun; DENG, Robert H et al.IET information security (Print). 2013, Vol 7, Num 1, issn 1751-8709, 60 p.Serial Issue

The International Source of Innovation for the Information Security and IT Audit ProfessionalCAMENISCH, Jan; FISCHER-HÜBNER, Simone; MURAYAMA, Yuko et al.Computers & security. 2013, Vol 33, issn 0167-4048, 70 p.Serial Issue

RADIO FREQUENCY IDENTIFICATION APPLICATIONS AND NETWORKS SECURITYCHAN YEOB YEUN; MOHAMED JAMAL ZEMERLY; AKMAYEVA, Galyna et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 3-4, issn 1748-569X, 200 p.Serial Issue

Network ForensicsMEMON, Nasir; GOEL, Rajni.International journal of security and networks (Print). 2008, Vol 3, Num 2, pp 80-121, issn 1747-8405, 41 p.Conference Paper

Advances in information and computer security (First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006)Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-47699-7, 1Vol, XIII-438 p, isbn 3-540-47699-7Conference Proceedings

Information security (8th international conference, ISC 2005, Singapore, September 20-23, 2005, proceedings)Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-29001-X, 1Vol, 516 p., isbn 3-540-29001-XConference Proceedings

Foundational Aspects of SecurityCHATZIKOKOLAKIS, Konstantinos; MÖDERSHEIM, Sebastian ALexander; PALAMIDESSI, Catuscia et al.Journal of computer security. 2014, Vol 22, Num 2, issn 0926-227X, 155 p.Serial Issue

2ND INTERNATIONAL SYMPOSIUM ON SECURE VIRTUAL INFRASTRUCTURESFERSCHA, Alois; PEARSON, Siani.Computer systems science and engineering. 2013, Vol 28, Num 6, issn 0267-6192, 94 p.Serial Issue

Inside Risks The Cybersecurity RiskGARFINKEL, Simson L.Communications of the ACM. 2012, Vol 55, Num 6, pp 29-32, issn 0001-0782, 4 p.Article

SECURITY ENHANCEMENTFREDRICK JAPHET MTENZI; AL-DAHOUD, Ali; AKMAYEVA, Galyna et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 1-2, issn 1748-569X, 202 p.Serial Issue

SECURITY, PRIVACY, AND IDENTIFICATION TECHNOLOGIES IN WIRELESS SENSOR NETWORKSYANG, Ming-Hour; LIU, Jonathan C. L; TSENG, Yu-Chee et al.International journal of security and networks (Print). 2010, Vol 5, Num 1, issn 1747-8405, 78 p.Serial Issue

SSTIC 2007 Special IssueJournal in computer virology. 2008, Vol 4, Num 1, issn 1772-9890, 81 p.Conference Proceedings

Data and applications security XX (20th Annual IFIP WG 11.3 working conference on data and applications security, Sophia Antipolis, France, July 31-August 2, 2006)Damiani, Ernesto; Liu, Peng.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36796-9, 1Vol, X-317 p, isbn 3-540-36796-9Conference Proceedings

Foundations of security analysis and design III (FOSAD 2004/2005 Tutorial lectures)Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-29243-8, 1Vol, VI-272 p, isbn 3-540-29243-8Conference Proceedings

Sécurité des systèmes d'informationLAMMARI, Nadira; CUPPENS, Nora; LALEAU, Régine et al.Ingénierie des systèmes d'information (2001). 2014, Vol 19, Num 6, issn 1633-1311, 111 p.Serial Issue

CYBERCRIME PREVENTION, DETECTION AND RESPONSEAL-NEMRAT, Ameer; S. WEIR, George R.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 2, issn 1751-911X, 81 p.Serial Issue

Protecting Users of the Cyber CommonsLUKASIK, Stephen J.Communications of the ACM. 2011, Vol 54, Num 9, pp 54-61, issn 0001-0782, 8 p.Article

Technology EnhancementALI, Al-Dahoud; JAPHET MTENZI.International journal of internet technology and secured transactions (Print). 2009, Vol 1, Num 3-4, issn 1748-569X, 160 p.Serial Issue

SSTIC 2007 Bet Academic PapersJournal in computer virology. 2008, Vol 4, Num 2, issn 1772-9890, 76 p.Conference Proceedings

Toward a Science of Secure EnvironmentsMcDANIEL, Patrick; RIVERA, Brian; SWAMI, Ananthram et al.IEEE security & privacy. 2014, Vol 12, Num 4, pp 68-70, issn 1540-7993, 3 p.Article

Security in Cloud ComputingGRITZALIS, Stefanos; MITCHELL, Chris; THURAISINGHAM, Bhavani et al.International journal of information security (Print). 2014, Vol 13, Num 2, issn 1615-5262, 122 p.Serial Issue

SYSTEMS SECURITY, SAFETY AND SUSTAINABILITYInternational journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 2, issn 1751-911X, 77 p.Serial Issue

Privacy, Security and Trust for Mobile SystemsSHA, Kewei; WU, Zhengping.Wireless personal communications. 2013, Vol 73, Num 1, issn 0929-6212, 170 p.Serial Issue

Security and Trust PrinciplesDEGANO, Pierpaolo; GUTTMAN, Joshua D.Journal of computer security. 2013, Vol 21, Num 6, issn 0926-227X, 230 p.Serial Issue

Sécurité des Systèmes d'Information et des Environnements Collaboratifs (SEC-SY)Génie logiciel (1995). 2010, Num 94, issn 1265-1397, 64 p.Conference Proceedings

  • Page / 383