Tomeki

Explore Books on
systems and data security

1-24 of 433 Books

View e-Business and Telecommunications By Mohammad S. Obaidat,Joaquim Filipe
Cover of e-Business and Telecommunications by mohammad s. obaidat,joaquim filipe

e-Business and Telecommunications

By Mohammad S. Obaidat,Joaquim Filipe

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View Security in Computing and Communications By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero
Cover of Security in Computing and Communications by sabu m. thampi,sanjay madria,guojun wang,danda b. rawat,jose m. alcaraz calero

Security in Computing and Communications

By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero

View Intelligence and Security Informatics By Michael Chau
Cover of Intelligence and Security Informatics by michael chau

Intelligence and Security Informatics

By Michael Chau

View Information Security and Cryptology By Dongdai Lin,Shouhuai Xu,Moti Yung
Cover of Information Security and Cryptology by dongdai lin,shouhuai xu,moti yung

Information Security and Cryptology

By Dongdai Lin,Shouhuai Xu,Moti Yung

View Modeling Decisions for Artificial Intelligence By Vicenç Torra
Cover of Modeling Decisions for Artificial Intelligence by vicenç torra

Modeling Decisions for Artificial Intelligence

By Vicenç Torra

View Digital Forensics and Watermarking By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu
Cover of Digital Forensics and Watermarking by yun qing shi,hyoung joong kim,fernando perez-gonzalez,feng liu

Digital Forensics and Watermarking

By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu

View Future Data and Security Engineering By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai
Cover of Future Data and Security Engineering by tran khanh dang,roland wagner,erich j. neuhold,makoto takizawa,josef küng,nam thoai

Future Data and Security Engineering

By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai

View Secure data management By Willem Jonker,Milan Petkovic
Cover of Secure data management by willem jonker,milan petkovic

Secure data management

By Willem Jonker,Milan Petkovic

View Internet and Distributed Computing Systems By Wenfeng Li,Shawkat Ali,Gabriel Lodewijks,Giancarlo Fortino,Giuseppe Di Fatta,Zhouping Yin,Mukaddim Pathan,Antonio Guerrieri,Qiang Wang
Cover of Internet and Distributed Computing Systems by wenfeng li,shawkat ali,gabriel lodewijks,giancarlo fortino,giuseppe di fatta,zhouping yin,mukaddim pathan,antonio guerrieri,qiang wang

Internet and Distributed Computing Systems

By Wenfeng Li,Shawkat Ali,Gabriel Lodewijks,Giancarlo Fortino,Giuseppe Di Fatta,Zhouping Yin,Mukaddim Pathan,Antonio Guerrieri,Qiang Wang

View Applications and Techniques in Information Security By Lynn Batten,Gang Li
Cover of Applications and Techniques in Information Security by lynn batten,gang li

Applications and Techniques in Information Security

By Lynn Batten,Gang Li

View Cyber Security and Privacy By Frances Cleary,Massimo Felici
Cover of Cyber Security and Privacy by frances cleary,massimo felici

Cyber Security and Privacy

By Frances Cleary,Massimo Felici

View Computer Safety, Reliability, and Security By Friedemann Bitsch,Jérémie Guiochet,Mohamed Kaâniche
Cover of Computer Safety, Reliability, and Security by friedemann bitsch,jérémie guiochet,mohamed kaâniche

Computer Safety, Reliability, and Security

By Friedemann Bitsch,Jérémie Guiochet,Mohamed Kaâniche

View Digital Forensics and Cyber Crime By Pavel Gladyshev
Cover of Digital Forensics and Cyber Crime by pavel gladyshev

Digital Forensics and Cyber Crime

By Pavel Gladyshev

View Policies and Research in Identity Management By Simone Fischer-Hübner
Cover of Policies and Research in Identity Management by simone fischer-hübner

Policies and Research in Identity Management

By Simone Fischer-Hübner

View Human Aspects of Information Security, Privacy and Trust By Theo Tryfonas
Cover of Human Aspects of Information Security, Privacy and Trust by theo tryfonas

Human Aspects of Information Security, Privacy and Trust

By Theo Tryfonas

View Communications and Multimedia Security By Bart De Decker,David W. Chadwick
Cover of Communications and Multimedia Security by bart de decker,david w. chadwick

Communications and Multimedia Security

By Bart De Decker,David W. Chadwick

View Privacy Technologies and Policy By Bart Preneel,Demosthenes Ikonomou

Privacy Technologies and Policy

Privacy Technologies and Policy

By Bart Preneel,Demosthenes Ikonomou

View Computer Networks By Andrzej Kwiecień
Cover of Computer Networks by andrzej kwiecień

Computer Networks

By Andrzej Kwiecień

View Trustworthy Computing and Services By Yuyu Yuan,Xu Wu,Yueming Lu
Cover of Trustworthy Computing and Services by yuyu yuan,xu wu,yueming lu

Trustworthy Computing and Services

By Yuyu Yuan,Xu Wu,Yueming Lu

View Recent Trends in Computer Networks and Distributed Systems Security By Sabu M. Thampi
Cover of Recent Trends in Computer Networks and Distributed Systems Security by sabu m. thampi

Recent Trends in Computer Networks and Distributed Systems Security

By Sabu M. Thampi

View Outlier Analysis By Charu C. Aggarwal
Cover of Outlier Analysis by charu c. aggarwal

Outlier Analysis

By Charu C. Aggarwal

View Security and Privacy in Mobile Information and Communication Systems By Andreas U. Schmidt,Giovanni Russello,Antonio Lioy
Cover of Security and Privacy in Mobile Information and Communication Systems by andreas u. schmidt,giovanni russello,antonio lioy

Security and Privacy in Mobile Information and Communication Systems

By Andreas U. Schmidt,Giovanni Russello,Antonio Lioy

View Service Oriented and Cloud Computing By Schahram Dustdar,Frank Leymann,Massimo Villari
Cover of Service Oriented and Cloud Computing by schahram dustdar,frank leymann,massimo villari

Service Oriented and Cloud Computing

By Schahram Dustdar,Frank Leymann,Massimo Villari