Search Results for Computer science - Narrowed by: Computer security -- Congresses SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bscience$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bCongresses$002509Computer$002bsecurity$002b--$002bCongresses$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-30T19:21:42Z Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517549 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar),&#160;Cervesato, Iliano,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000522<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769293&#160;9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedings ent://SD_ILS/0/SD_ILS:292557 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;EuroISI 2008 (2008 : Esbjerg, Denmark)<br/>Author&#160;EuroISI 2008 (2008 : Esbjerg, Denmark),&#160;Ortiz-Arroyo, Daniel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E97 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540898993<br/> Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292944 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;VizSec 2008 2008 : Cambridge, Mass.)<br/>Author&#160;VizSec 2008 2008 : Cambridge, Mass.),&#160;Goodall, John R.,&#160;Conti, Greg,&#160;Ma, Kwan-liu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V59 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540859314<br/> Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292950 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;PSD 2008 (2008 : Istanbul, Turkey)<br/>Author&#160;PSD 2008 (2008 : Istanbul, Turkey),&#160;Domingo-Ferrer, Josep,&#160;Saygin, Yucel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P74 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540874706<br/> Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers ent://SD_ILS/0/SD_ILS:328761 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;IH 2008 (2008 : Santa Barbara, California)<br/>Author&#160;IH 2008 (2008 : Santa Barbara, California),&#160;Solanki, Kaushal,&#160;Sullivan, Kenneth,&#160;Madhow, Upamanyu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I49 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540889601<br/> Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers ent://SD_ILS/0/SD_ILS:225946 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;CIS 2006 (2006 : Guangzhou Shi, China)<br/>Author&#160;CIS 2006 (2006 : Guangzhou Shi, China),&#160;Wang, Yuping, 1961-,&#160;Cheung, Yiu-ming,&#160;Liu, Hailin, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;Q342 C57 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540743767<br/><a href="=856 40$uhttp://dx.doi.org/10.1007/978-3-540-74377-4">Fulltext</a><br/> Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings ent://SD_ILS/0/SD_ILS:225997 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author&#160;RAID 2007 (2007 : Gold Coast, Qld.),&#160;Kruegel, Christopher, 1976-,&#160;Lippmann, Richard,&#160;Clark, Andrew, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R344 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/> Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers ent://SD_ILS/0/SD_ILS:254595 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Camenisch, Jan<br/>Author&#160;Camenisch, Jan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I537 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540741237<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">Fulltext</a><br/> Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516706 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;ISC 2007 (2007 : Valparaiso, Chile)<br/>Author&#160;ISC 2007 (2007 : Valparaiso, Chile),&#160;Garay, Juan A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000183<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:516817 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;ISPEC 2007 (2007 : Hong Kong, China)<br/>Author&#160;ISPEC 2007 (2007 : Hong Kong, China),&#160;Dawson, Ed,&#160;Wong, Duncan S.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000195<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540721635<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517052 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;ACISP 2007 (2007 : Townsville, Qld.)<br/>Author&#160;ACISP 2007 (2007 : Townsville, Qld.),&#160;Pieprzyk, Josef, 1949-,&#160;Ghodosi, Hossein,&#160;Dawson, Ed (Edward),&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000185<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540734581<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517542 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;ICISC 2007 (2007 : Seoul, Korea)<br/>Author&#160;ICISC 2007 (2007 : Seoul, Korea),&#160;Nam, Kil-Hyun,&#160;Rhee, Gwangsoo,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000184<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540767886&#160;9783540767879<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers ent://SD_ILS/0/SD_ILS:254405 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;FAST 2006 (2006 : Hamilton, Ont.)<br/>Author&#160;FAST 2006 (2006 : Hamilton, Ont.),&#160;Dimitrakos, Theo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F374 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540752264<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings. ent://SD_ILS/0/SD_ILS:517498 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia),&#160;Gorodetsky, Vladimir,&#160;Kotenko, Igor,&#160;Skormin, Victor A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001125<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540739869&#160;9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142230 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;SCN 2006 (2006 : Maiori, Italy)<br/>Author&#160;SCN 2006 (2006 : Maiori, Italy),&#160;De Prisco, Roberto, 1968-,&#160;Yung, Moti<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S42 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540380801<br/> Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:143331 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;IH 2005 ( 2005 : Barcelona, Spain)<br/>Author&#160;IH 2005 ( 2005 : Barcelona, Spain),&#160;Barni, Mauro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I534 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540290391<br/> Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedings ent://SD_ILS/0/SD_ILS:159459 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Debar, Herve, 1961-<br/>Author&#160;Debar, Herve, 1961-,&#160;Me, Ludovic, 1963-,&#160;Wu, S. Felix, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R44 2000<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2000<br/>ISBN&#160;9783540410850<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516712 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan),&#160;Miyaji, Atsuko,&#160;Kikuchi, Hiroaki,&#160;Rannenberg, Kai,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000582<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517035 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway)<br/>Author&#160;International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway),&#160;Bandara, Arosha K.,&#160;Burgess, Mark, 1966-,&#160;Association for Computing Machinery,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000326<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540729860<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517560 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India),&#160;McDaniel, Patrick (Patrick Drew),&#160;Gupta, Shyam K.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000198<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540770862&#160;9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517548 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak)<br/>Author&#160;International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak),&#160;Kurosawa, Kaoru,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000526<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769002&#160;9783540768999<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings ent://SD_ILS/0/SD_ILS:170904 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India),&#160;Bagchi, Aditya,&#160;Atluri, Vijayalaksmi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540689621<br/> Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:271750 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary)<br/>Author&#160;European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary),&#160;Molva, Refik,&#160;Tsudik, G. (Gene),&#160;Westhoff, Dirk<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 E97 2005<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540309123<br/> Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings ent://SD_ILS/0/SD_ILS:143340 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India),&#160;Jajodia, Sushil,&#160;Mazumdar, Chandan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540307068<br/> Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings ent://SD_ILS/0/SD_ILS:394371 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;International Conference on Information and Communications Security (4th : 2002 : Singapore)<br/>Author&#160;International Conference on Information and Communications Security (4th : 2002 : Singapore),&#160;Deng, Robert<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I57 2002<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2002<br/>ISBN&#160;9783540001645<br/> Information security and privacy : Second Australian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings ent://SD_ILS/0/SD_ILS:474100 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Varadharajan, Vijay<br/>Author&#160;Varadharajan, Vijay,&#160;Pieprzyk, Josef,&#160;Mu, Yi,&#160;Australian Conference on Information Security and Privacy (2nd : 1997 : Sydney, New South Wales)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I56 1997<br/>Publisher&#160;Springer,<br/>Publication Date&#160;1997<br/>ISBN&#160;9783540632320<br/> Security and control of information technology in society ent://SD_ILS/0/SD_ILS:307369 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia)<br/>Author&#160;IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia),&#160;Sizer, Richard<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I73 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780444818317<br/> Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517080 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;SSS 2007 (2007 : Paris, France)<br/>Author&#160;SSS 2007 (2007 : Paris, France),&#160;Masuzawa, Toshimitsu,&#160;Tixeuil, Sebastien,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000187<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540766278&#160;9783540766261<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517060 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.),&#160;Susilo, Willy,&#160;Liu, Joseph K.,&#160;Mu, Yi, 1955-,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000343<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer security : proceedings ent://SD_ILS/0/SD_ILS:334585 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.),&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I45 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780444817488<br/> Engineering dependable software systems ent://SD_ILS/0/SD_ILS:841380 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany),&#160;Broy, M., 1949- editor,&#160;Peled, Doron A., 1962- editor,&#160;Kalus, Georg editor,&#160;NATO Emerging Security Challenges Division<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 N38 2013<br/>Publisher&#160;IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781614992066<br/> Software safety and security : tools for analysis and verification ent://SD_ILS/0/SD_ILS:796058 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Nipkow, Tobias<br/>Author&#160;Nipkow, Tobias,&#160;Grumberg, Orna,&#160;Hauptmann, Benedikt<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 S64 2012<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781614990277<br/> Enhancing cryptographic primitives with techniques from error correcting codes ent://SD_ILS/0/SD_ILS:812808 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko T&#365;rnovo, Bulgaria)<br/>Author&#160;NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko T&#365;rnovo, Bulgaria),&#160;Preneel, Bart, 1963-,&#160;North Atlantic Treaty Organization. Public Diplomacy Division<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N384 2009<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781607500025<br/> Algorithms, architectures and information systems security ent://SD_ILS/0/SD_ILS:327048 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Bhattacharya, Bhargab B.<br/>Author&#160;Bhattacharya, Bhargab B.,&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A43 2009<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2009<br/>ISBN&#160;9789812836236<br/> Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers ent://SD_ILS/0/SD_ILS:282943 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;Adams, Carlisle 1961-<br/>Author&#160;Adams, Carlisle 1961-,&#160;Miri, Ali,&#160;Wiener, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S45 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540773597<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:174888 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco),&#160;Thomas, Johnson P.,&#160;Essaaidi, Mohamed<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N37 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586036782<br/> Verification of infinite-state systems with applications to security ent://SD_ILS/0/SD_ILS:164111 2024-06-30T19:21:42Z 2024-06-30T19:21:42Z Format:&#160;Books<br/>Call Number&#160;Q295 V47 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586035709<br/>