1-24 of 40 Books

The net delusion
By Evgeny Morozov,E. Morozov,Eduardo G. Murillo

Mechanics of user identification and authentication
By Dobromir Todorov

Security for Web Services and Service-Oriented Architectures
By Elisa Bertino

Security for computer networks
By D. W. Davies,Donald Watts Davies

Privatsphäre durch die Delegation von Rechten
By Sven Wohlgemuth

Computer control and security
By William E. Perry

Computer security and protectionstructures
By Bruce J. Walker

Secure data management
By SDM 2005 (2005 Trondheim, Norway)
IT security governance guidebook with security program metrics on CD-ROM
IT security governance guidebook with security program metrics on CD-ROM
By Frederick B. Cohen

Control and security of computer information systems
By Philip E. Fites

Cross enterprise integration with SAP GRC Access Control
By Raj Behera

Information and Communications Security
By ICICS <12, 2010, Barcelona>

Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
Advances in information and computer security
Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

Privacy enhancing technologies
By PET 2002 (2002 San Francisco, Calif.)

Information and communications security
By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

Computer Security – ESORICS 2009
By Michael Backes

Ad-Hoc, Mobile and Wireless Networks
By Pedro M. Ruíz

Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)