Refine your search
Availability
-
Authors
- Gebotys, Catherine ... (1)
- Kleidermacher, Davi... (1)
- Slay, Jill; Koronio... (1)
- Agrawal, Manish (1)
- Belapure, Sunit (1)
- Bishop, Matt (1)
- Bloom, Jeffrey (1)
- Campoe, Alex (1)
- Cox, Ingemar (1)
- Fridrich, Jessica (1)
- Gertz, Michael (1)
- Ghosh, Sumit (1)
- Godbole, Nina (1)
- Gregg, Michael (1)
- Jajodia, Sushil (1)
- Jonker, Willem (1)
- Kleidermacher, Mike (1)
- Luttgens, Jason T (2)
- Mackey, David (1)
- Mandia, Kevin (2)
- Miller, David R (1)
- Miller, Matthew (1)
- Minoli, Daniel (1)
- Mitchell, Chris J (1)
- Pepe, Matthew (2)
- Petkovic, Milan (1)
- Pfleefer, Shari Lawr... (1)
- Pfleeger, Charles P (2)
- Pfleeger, Shari Lawr... (1)
- Pierec, Eric (1)
- Santnam, Raghu (1)
- Sethumadhavan, M (1)
- Shah, Deven (1)
- Stapko, Timothy (1)
- Virendra, Mohit (1)
- Show more
- Show less
-
Holding libraries
-
Item types
- Books (20)
-
Series
- Embedded Systems (1)
-
Topics
- Computer crimes (3)
- Computer crimes--Inv... (2)
- Computer networks--S... (8)
- Computer science (2)
- Computer security (20)
- Computer security--M... (4)
- Computer software--D... (1)
- Computers--Access co... (1)
- Computersicherheit (1)
- Cyberspace--Security... (1)
- Data protection (8)
- Database management (2)
- Database security (2)
- Digital watermarking (1)
- Electronic data proc... (1)
- Embedded computer sy... (1)
- Financial risk manag... (1)
- Information storage ... (1)
- Information technolo... (2)
- Mobile communication... (1)
- Nanotechnology--Risk... (1)
- Privacy, Right of (1)
- Risikomanagement (1)
- Systems engineering (1)
- Technology (2)
- Unternehmen (1)
- Web sites--Security ... (1)
- World Wide Web--Secu... (1)
- Show more
- Show less