Search Results for Computer security -- CongressesSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bCongresses$0026ps$003d300?dt=list2024-04-20T16:22:24ZProceedings of a symposium on trends and applicationsent://SD_ILS/0/SD_ILS:3489122024-04-20T16:22:24Z2024-04-20T16:22:24Zby Symposium on Trends and Applications (1976-)<br/>Author Symposium on Trends and Applications (1976-), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1976 f<br/>Publisher IEEE,<br/>Publication Date 2020 2019 2018 2017 2016<br/>Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedingsent://SD_ILS/0/SD_ILS:8196482024-04-20T16:22:24Z2024-04-20T16:22:24Zby TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author TrustBus (Conference) (10th : 2013 : Prague, Czech Republic), Furnell, Steven, 1970-, Lambrinoudakis, Costas, López, Javier<br/>Format: Books<br/>Call Number HF5548.32 T78 2013<br/>Edition 1st ed.<br/>Publisher Springer,<br/>Publication Date 2013<br/>ISBN 9783642403422<br/>Data management and security : applications in medicine, science and engineeringent://SD_ILS/0/SD_ILS:8200842024-04-20T16:22:24Z2024-04-20T16:22:24Zby Rabasa, A. (Alejandro), editor of compilation<br/>Author Rabasa, A. (Alejandro), editor of compilation, Brebbia, C. A.<br/>Format: Books<br/>Call Number QA76.9 .D314 D377 2013<br/>Publisher WIT Press,<br/>Publication Date 2013<br/>ISBN 9781845647087<br/>Engineering dependable software systemsent://SD_ILS/0/SD_ILS:8413802024-04-20T16:22:24Z2024-04-20T16:22:24Zby NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany), Broy, M., 1949- editor, Peled, Doron A., 1962- editor, Kalus, Georg editor, NATO Emerging Security Challenges Division<br/>Format: Books<br/>Call Number QA76.76.V47 N38 2013<br/>Publisher IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date 2013<br/>ISBN 9781614992066<br/>Software safety and security : tools for analysis and verificationent://SD_ILS/0/SD_ILS:7960582024-04-20T16:22:24Z2024-04-20T16:22:24Zby Nipkow, Tobias<br/>Author Nipkow, Tobias, Grumberg, Orna, Hauptmann, Benedikt<br/>Format: Books<br/>Call Number QA76.76.V47 S64 2012<br/>Publisher IOS Press,<br/>Publication Date 2012<br/>ISBN 9781614990277<br/>Computing and communicationent://SD_ILS/0/SD_ILS:8041332024-04-20T16:22:24Z2024-04-20T16:22:24Zby Vijayakumar, R.<br/>Author Vijayakumar, R.<br/>Format: Books<br/>Call Number QA75.5 C656 2012<br/>Publisher Narosa Publishing House,<br/>Publication Date 2012<br/>ISBN 9788184871784<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:7961882024-04-20T16:22:24Z2024-04-20T16:22:24Zby Software agents, agent systems and their applications / [edited by] Mohammad Essaidi, Maria Ganzha, Marcin Paprzycki<br/>Author Software agents, agent systems and their applications / [edited by] Mohammad Essaidi, Maria Ganzha, Marcin Paprzycki, Essaaidi, Mohamad, Ganzha, Maria, Paprzycki, Marcin<br/>Format: Books<br/>Call Number QA76.76.I58 S64 2012<br/>Publisher IOS Press,<br/>Publication Date 2012<br/>ISBN 9781607508175<br/>Information security, coding theory and related combinatorics : information coding and combinatoricsent://SD_ILS/0/SD_ILS:7727612024-04-20T16:22:24Z2024-04-20T16:22:24Zby Proceeding of the NATO Advanced Study Institute "Information Security and Related Combinatorics" (2010 : Opatija, Croatia)<br/>Author Proceeding of the NATO Advanced Study Institute "Information Security and Related Combinatorics" (2010 : Opatija, Croatia), Crnkovic, Dean, Tonchev, Vladimir<br/>Format: Books<br/>Call Number QA404.7 P76 2010<br/>Publisher IOS Press,<br/>Publication Date 2011<br/>ISBN 9781607506621 9781607506638<br/>Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&IS 2010ent://SD_ILS/0/SD_ILS:7727432024-04-20T16:22:24Z2024-04-20T16:22:24Zby Barzdins, Janis<br/>Author Barzdins, Janis, Kirikova, Marite<br/>Format: Books<br/>Call Number QA76.9.D3 D37 2010<br/>Publisher IOS Press,<br/>Publication Date 2011<br/>ISBN 9781607506874<br/>Computer security : protecting digital resourcesent://SD_ILS/0/SD_ILS:3746692024-04-20T16:22:24Z2024-04-20T16:22:24Zby Newman, Robert C.<br/>Author Newman, Robert C.<br/>Format: Books<br/>Call Number QA76.9.D314 N48 2010<br/>Publisher Jones & Bartlett Publishers,<br/>Publication Date 2010<br/>ISBN 9780763759940<br/>Human systems integration to enhance maritime domain awareness for port/parbour securityent://SD_ILS/0/SD_ILS:8128132024-04-20T16:22:24Z2024-04-20T16:22:24Zby Shahbazian, Elisa<br/>Author Shahbazian, Elisa, Rogova, Galina<br/>Format: Books<br/>Call Number HE551 H86 2010<br/>Publisher IOS Press,<br/>Publication Date 2010<br/>ISBN 9781607506201<br/>Biometric technology for human identification VII : 5-6 April 2010, Orlando, Florida, United Statesent://SD_ILS/0/SD_ILS:7878352024-04-20T16:22:24Z2024-04-20T16:22:24Zby Kumar, B. V. K. Vijaya, 1953-<br/>Author Kumar, B. V. K. Vijaya, 1953-, Prabhakar, Salil, Ross, Arun A. (Arun Abraham), SPIE (Society)<br/>Format: Books<br/>Call Number TK7882.B56 B566 2010 f<br/>Publisher SPIE,<br/>Publication Date 2010<br/>ISBN 9780819481313<br/>Enhancing cryptographic primitives with techniques from error correcting codesent://SD_ILS/0/SD_ILS:8128082024-04-20T16:22:24Z2024-04-20T16:22:24Zby NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria)<br/>Author NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria), Preneel, Bart, 1963-, North Atlantic Treaty Organization. Public Diplomacy Division<br/>Format: Books<br/>Call Number QA76.9.A25 N384 2009<br/>Publisher IOS Press,<br/>Publication Date 2009<br/>ISBN 9781607500025<br/>Proceedings of the 3rd European conference on computer network defenseent://SD_ILS/0/SD_ILS:2930232024-04-20T16:22:24Z2024-04-20T16:22:24Zby Siris, Vasilios<br/>Author Siris, Vasilios<br/>Format: Books<br/>Call Number TK5105.59 P68 2009<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387855547<br/>Guide to strategic infrastructure security : becoming a security network professionalent://SD_ILS/0/SD_ILS:3254992024-04-20T16:22:24Z2024-04-20T16:22:24Zby Weaver, Randy<br/>Author Weaver, Randy, Weaver, Dawn<br/>Format: Books<br/>Call Number TK5105.59 W47 2009<br/>Publisher Course Technology,<br/>Publication Date 2009<br/>ISBN 9781418836610<br/>Algorithms, architectures and information systems securityent://SD_ILS/0/SD_ILS:3270482024-04-20T16:22:24Z2024-04-20T16:22:24Zby Bhattacharya, Bhargab B.<br/>Author Bhattacharya, Bhargab B., International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Format: Books<br/>Call Number QA76.9.A25 A43 2009<br/>Publisher World Scientific,<br/>Publication Date 2009<br/>ISBN 9789812836236<br/>Real-time crowd simulations for interactive virtual environmentsent://SD_ILS/0/SD_ILS:2516562024-04-20T16:22:24Z2024-04-20T16:22:24Zby Mohd. Shahrizal Sunar<br/>Author Mohd. Shahrizal Sunar, Mohamed 'Adi Mohamed Azahar, Daut Daman, Abdullah Bade, International Conference & Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format: Books<br/>Call Number QA76.9.C65 R424 2008<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Principles, systems and applications of IP telecommunications : services and security for next generation networks : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008 : revised selected papersent://SD_ILS/0/SD_ILS:2905632024-04-20T16:22:24Z2024-04-20T16:22:24Zby IPTComm 2008 (2008 : Heidelberg, Germany)<br/>Author IPTComm 2008 (2008 : Heidelberg, Germany), Schulzrinne, Henning, State, Radu, 1972-, Niccolini, Saverio<br/>Format: Books<br/>Call Number TK5105.5 I674 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540890539<br/>Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedingsent://SD_ILS/0/SD_ILS:2925572024-04-20T16:22:24Z2024-04-20T16:22:24Zby EuroISI 2008 (2008 : Esbjerg, Denmark)<br/>Author EuroISI 2008 (2008 : Esbjerg, Denmark), Ortiz-Arroyo, Daniel<br/>Format: Books<br/>Call Number QA76.9.A25 E97 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540898993<br/>Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929442024-04-20T16:22:24Z2024-04-20T16:22:24Zby VizSec 2008 2008 : Cambridge, Mass.)<br/>Author VizSec 2008 2008 : Cambridge, Mass.), Goodall, John R., Conti, Greg, Ma, Kwan-liu<br/>Format: Books<br/>Call Number QA76.9.A25 V59 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540859314<br/>Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929502024-04-20T16:22:24Z2024-04-20T16:22:24Zby PSD 2008 (2008 : Istanbul, Turkey)<br/>Author PSD 2008 (2008 : Istanbul, Turkey), Domingo-Ferrer, Josep, Saygin, Yucel<br/>Format: Books<br/>Call Number QA76.9.A25 P74 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540874706<br/>Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papersent://SD_ILS/0/SD_ILS:3287612024-04-20T16:22:24Z2024-04-20T16:22:24Zby IH 2008 (2008 : Santa Barbara, California)<br/>Author IH 2008 (2008 : Santa Barbara, California), Solanki, Kaushal, Sullivan, Kenneth, Madhow, Upamanyu<br/>Format: Books<br/>Call Number QA76.9.A25 I49 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540889601<br/>Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papersent://SD_ILS/0/SD_ILS:2259462024-04-20T16:22:24Z2024-04-20T16:22:24Zby CIS 2006 (2006 : Guangzhou Shi, China)<br/>Author CIS 2006 (2006 : Guangzhou Shi, China), Wang, Yuping, 1961-, Cheung, Yiu-ming, Liu, Hailin, 1963-<br/>Format: Books<br/>Call Number Q342 C57 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540743767<br/><a href="=856 40$uhttp://dx.doi.org/10.1007/978-3-540-74377-4">Fulltext</a><br/>Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedingsent://SD_ILS/0/SD_ILS:2259972024-04-20T16:22:24Z2024-04-20T16:22:24Zby RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author RAID 2007 (2007 : Gold Coast, Qld.), Kruegel, Christopher, 1976-, Lippmann, Richard, Clark, Andrew, 1971-<br/>Format: Books<br/>Call Number QA76.9.A25 R344 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/>Networks, security and soft computing : trends and future directionsent://SD_ILS/0/SD_ILS:2453412024-04-20T16:22:24Z2024-04-20T16:22:24Zby National Conference on Trends in Advanced Computing (2007: Tezpur University)<br/>Author National Conference on Trends in Advanced Computing (2007: Tezpur University), Bhattacharyya, Dhruba K., Hazarika, Shyamanta M.<br/>Format: Books<br/>Call Number TK5105.5 N376 2007<br/>Publisher Alpha Science Intl Ltd<br/>Publication Date 2007<br/>ISBN 9788173198687<br/>Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papersent://SD_ILS/0/SD_ILS:2545952024-04-20T16:22:24Z2024-04-20T16:22:24Zby Camenisch, Jan<br/>Author Camenisch, Jan<br/>Format: Books<br/>Call Number QA76.9.A25 I537 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9783540741237<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">Fulltext</a><br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6282012024-04-20T16:22:24Z2024-04-20T16:22:24Zby SAFECOMP 2007 (2007 : Nuremberg, Germany)<br/>Author SAFECOMP 2007 (2007 : Nuremberg, Germany), Saglietti, Francesca, Oster, Norbert, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001370<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540751014<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:6282642024-04-20T16:22:24Z2024-04-20T16:22:24Zby WISA 2006 (2006 : Cheju-do, Korea)<br/>Author WISA 2006 (2006 : Cheju-do, Korea), Lee, Jae Kwang, Yi, Okyeon, Yung, Moti., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001386<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540710936<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6255962024-04-20T16:22:24Z2024-04-20T16:22:24Zby European Workshop on Security in Ad-Hoc and Sensor Networks (4th : 2007 : Cambridge, England)<br/>Author European Workshop on Security in Ad-Hoc and Sensor Networks (4th : 2007 : Cambridge, England), Stajano, Frank., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB001267<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540732754<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6259512024-04-20T16:22:24Z2024-04-20T16:22:24Zby TrustBus 2007 (2007 : Regensburg, Germany)<br/>Author TrustBus 2007 (2007 : Regensburg, Germany), Lambrinoudakis, Costas, Pernul, Gunther, Tjoa, A. Min, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001313<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540744092<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6268292024-04-20T16:22:24Z2024-04-20T16:22:24Zby European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany), Biskup, Joachim, Lopez, Javier., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001353<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:6282362024-04-20T16:22:24Z2024-04-20T16:22:24Zby Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands)<br/>Author Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands), Vadhan, Salil P., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001382<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540709367<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167062024-04-20T16:22:24Z2024-04-20T16:22:24Zby ISC 2007 (2007 : Valparaiso, Chile)<br/>Author ISC 2007 (2007 : Valparaiso, Chile), Garay, Juan A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000183<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167122024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author International Workshop on Security (2nd : 2007 : Nara-shi, Japan), Miyaji, Atsuko, Kikuchi, Hiroaki, Rannenberg, Kai, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000582<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5168172024-04-20T16:22:24Z2024-04-20T16:22:24Zby ISPEC 2007 (2007 : Hong Kong, China)<br/>Author ISPEC 2007 (2007 : Hong Kong, China), Dawson, Ed, Wong, Duncan S., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000195<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540721635<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170352024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway)<br/>Author International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway), Bandara, Arosha K., Burgess, Mark, 1966-, Association for Computing Machinery, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000326<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540729860<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170262024-04-20T16:22:24Z2024-04-20T16:22:24Zby WISTP 2007 (2007 : Herakleion, Greece)<br/>Author WISTP 2007 (2007 : Herakleion, Greece), Sauveron, Damien, International Federation for Information Processing. Technical Committee 6, IFIP WG 8.8 (Smart Cards), SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000196<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170522024-04-20T16:22:24Z2024-04-20T16:22:24Zby ACISP 2007 (2007 : Townsville, Qld.)<br/>Author ACISP 2007 (2007 : Townsville, Qld.), Pieprzyk, Josef, 1949-, Ghodosi, Hossein, Dawson, Ed (Edward), SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000185<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734581<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170602024-04-20T16:22:24Z2024-04-20T16:22:24Zby ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author ProvSec 2007 (2007 : Wollongong, N.S.W.), Susilo, Willy, Liu, Joseph K., Mu, Yi, 1955-, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000343<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170802024-04-20T16:22:24Z2024-04-20T16:22:24Zby SSS 2007 (2007 : Paris, France)<br/>Author SSS 2007 (2007 : Paris, France), Masuzawa, Toshimitsu, Tixeuil, Sebastien, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000187<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540766278 9783540766261<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africaent://SD_ILS/0/SD_ILS:5170962024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC11 International Information Security Conference (22nd : 2007 : Sandton, South Africa)<br/>Author IFIP TC11 International Information Security Conference (22nd : 2007 : Sandton, South Africa), Venter, Hein, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000245<br/>Publisher International Federation for Information Processing,<br/>Publication Date 2007<br/>ISBN 9780387723679 9780387723662<br/><a href="http://dx.doi.org/10.1007/978-0-387-72367-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5173892024-04-20T16:22:24Z2024-04-20T16:22:24Zby PAISI 2007 (2007 : Chengdu, China)<br/>Author PAISI 2007 (2007 : Chengdu, China), Yang, Christopher C., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000317<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540715498<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175422024-04-20T16:22:24Z2024-04-20T16:22:24Zby ICISC 2007 (2007 : Seoul, Korea)<br/>Author ICISC 2007 (2007 : Seoul, Korea), Nam, Kil-Hyun, Rhee, Gwangsoo, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000184<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540767886 9783540767879<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175512024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Cryptology and Network Security (6th : 2007 : Singapore)<br/>Author International Conference on Cryptology and Network Security (6th : 2007 : Singapore), Bao, Feng, Dr., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001165<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769699 9783540769682<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175602024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author International Conference on Information Systems Security (3rd : 2007 : Delhi, India), McDaniel, Patrick (Patrick Drew), Gupta, Shyam K., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000198<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540770862 9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Fifth World Conference on Information Security Education proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USAent://SD_ILS/0/SD_ILS:5175682024-04-20T16:22:24Z2024-04-20T16:22:24Zby World Conference on Information Security Education (5th : 2007 : West Point, N.Y.)<br/>Author World Conference on Information Security Education (5th : 2007 : West Point, N.Y.), Futcher, Lynn, Dodge, Ronald, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001038<br/>Publisher International Federation for Information Processing,<br/>Publication Date 2007<br/>ISBN 9780387732695 9780387732688<br/><a href="http://dx.doi.org/10.1007/978-0-387-73269-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178812024-04-20T16:22:24Z2024-04-20T16:22:24Zby EUROCRYPT (2007 : Barcelona, Spain)<br/>Author EUROCRYPT (2007 : Barcelona, Spain), Naor, Moni, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000525<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540725404 9783540725398<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178852024-04-20T16:22:24Z2024-04-20T16:22:24Zby ACNS 2007 (2007 : Zhuhai, China)<br/>Author ACNS 2007 (2007 : Zhuhai, China), Katz, Jonathan, Yung, Moti, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001015<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540727385 9783540727378<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6256302024-04-20T16:22:24Z2024-04-20T16:22:24Zby European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain)<br/>Author European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain), Lopez, Javier, Ferrer, Josep L., Samarati, Pierangela, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001274<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734086<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6256762024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan)<br/>Author International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan), Takagi, Tsuyoshi, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001281<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734895<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6257092024-04-20T16:22:24Z2024-04-20T16:22:24Zby ATC 2007 (2007 : Hong Kong, China)<br/>Author ATC 2007 (2007 : Hong Kong, China), Xiao, Bin., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001286<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540735472<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:6260652024-04-20T16:22:24Z2024-04-20T16:22:24Zby SAC 2006 (2006 : Montreal, Quebec)<br/>Author SAC 2006 (2006 : Montreal, Quebec), Biham, Eli, Youssef, Amr M., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001320<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540744627<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Foundations of Security Analysis and Design. IV, FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:6268002024-04-20T16:22:24Z2024-04-20T16:22:24Zby International School on Foundations of Security Analysis and Design (2006-2007 : Bertinoro, Italy)<br/>Author International School on Foundations of Security Analysis and Design (2006-2007 : Bertinoro, Italy), Aldini, Alessandro, Gorrieri, Roberto, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001347<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540748106<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170212024-04-20T16:22:24Z2024-04-20T16:22:24Zby PAISI 2007 (2007 : Chengdu, China)<br/>Author PAISI 2007 (2007 : Chengdu, China), Yang, Christopher C., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000316<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540715498<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papersent://SD_ILS/0/SD_ILS:2829432024-04-20T16:22:24Z2024-04-20T16:22:24Zby Adams, Carlisle 1961-<br/>Author Adams, Carlisle 1961-, Miri, Ali, Wiener, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 S45 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540773597<br/>Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papersent://SD_ILS/0/SD_ILS:2544052024-04-20T16:22:24Z2024-04-20T16:22:24Zby FAST 2006 (2006 : Hamilton, Ont.)<br/>Author FAST 2006 (2006 : Hamilton, Ont.), Dimitrakos, Theo<br/>Format: Books<br/>Call Number QA76.9.A25 F374 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9783540752264<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5173942024-04-20T16:22:24Z2024-04-20T16:22:24Zby WISTP 2007 (2007 : Herakleion, Greece)<br/>Author WISTP 2007 (2007 : Herakleion, Greece), Sauveron, Damien, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000197<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.ent://SD_ILS/0/SD_ILS:5174982024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia), Gorodetsky, Vladimir, Kotenko, Igor, Skormin, Victor A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001125<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540739869 9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175482024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak)<br/>Author International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak), Kurosawa, Kaoru, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000526<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769002 9783540768999<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175492024-04-20T16:22:24Z2024-04-20T16:22:24Zby Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar), Cervesato, Iliano, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000522<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769293 9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>New technologies, mobility and securityent://SD_ILS/0/SD_ILS:5175822024-04-20T16:22:24Z2024-04-20T16:22:24Zby Labiod, Houda<br/>Author Labiod, Houda, Badra, Mohamad, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000285<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9781402062704 9781402062698<br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178822024-04-20T16:22:24Z2024-04-20T16:22:24Zby BioSurveillance 2007 (2007 : New Brunswick, N.J.)<br/>Author BioSurveillance 2007 (2007 : New Brunswick, N.J.), Zeng, Daniel, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000318<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540726081 9783540726074<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1709042024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author International Conference on Information Systems Security (2nd : 2006 : Calcutta, India), Bagchi, Aditya, Atluri, Vijayalaksmi<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540689621<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:1748882024-04-20T16:22:24Z2024-04-20T16:22:24Zby NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco), Thomas, Johnson P., Essaaidi, Mohamed<br/>Format: Books<br/>Call Number QA76.9.A25 N37 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586036782<br/>Verification of infinite-state systems with applications to securityent://SD_ILS/0/SD_ILS:1641112024-04-20T16:22:24Z2024-04-20T16:22:24ZFormat: Books<br/>Call Number Q295 V47 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586035709<br/>Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Swedenent://SD_ILS/0/SD_ILS:1582062024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden), Fischer-Hubner, Simone<br/>Format: Books<br/>Call Number QA76.9.A25 S429 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387334059<br/>Cyberwar-Netwar : security in the information ageent://SD_ILS/0/SD_ILS:1639422024-04-20T16:22:24Z2024-04-20T16:22:24Zby NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age ( 2003 : Lisbon, Portugal)<br/>Author NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age ( 2003 : Lisbon, Portugal), Carvalho, Fernando Duarte, Silva, Eduardo Mateus da<br/>Format: Books<br/>Call Number UA929.95.E43 N37 2006<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586036126<br/>Security and embedded systemsent://SD_ILS/0/SD_ILS:1872442024-04-20T16:22:24Z2024-04-20T16:22:24Zby Giladi, Ran<br/>Author Giladi, Ran, Serpanos, Dimitrios Nikolaou, NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece)<br/>Format: Books<br/>Call Number TK7895.E42 S42 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586035808<br/>Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422202024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author International Workshop on Security (1st : 2006 : Kyoto, Japan), Yoshiura, Hiroshi<br/>Format: Books<br/>Call Number QA76.9.A25 I575 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540476993<br/>Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422302024-04-20T16:22:24Z2024-04-20T16:22:24Zby SCN 2006 (2006 : Maiori, Italy)<br/>Author SCN 2006 (2006 : Maiori, Italy), De Prisco, Roberto, 1968-, Yung, Moti<br/>Format: Books<br/>Call Number TK5105.59 S42 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540380801<br/>Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:1163862024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile), Gaiti, Dominique, IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format: Books<br/>Call Number TK5105.5 I34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387348254<br/>Applied public key infrastructure : 4th International Workshop : IWAP 2005ent://SD_ILS/0/SD_ILS:1748302024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Workshop for Applied PKI (4th : 2005 : Singapore)<br/>Author International Workshop for Applied PKI (4th : 2005 : Singapore), Zhou, Jianying<br/>Format: Books<br/>Call Number QA76.9.A25 I577 2005<br/>Publisher IOS Press,<br/>Publication Date 2005<br/>ISBN 9781586035501<br/>Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conferenceent://SD_ILS/0/SD_ILS:1164332024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.)<br/>Author IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.), Dowland, Paul<br/>Format: Books<br/>Call Number QA76.9.A25 S427 2005<br/>Publisher Springer Verlag,<br/>Publication Date 2005<br/>ISBN 9780387298269<br/>Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysiaent://SD_ILS/0/SD_ILS:8458472024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia)<br/>Author International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia), Dawson, Ed (Edward) editor, Vaudenay, Serge, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I554 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540289388<br/>Restricted to SpringerLink subscribers
<a href=" http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html"> http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html</a>
<a href=" http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html"> http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html</a><br/>Proceedings of the 1st international symposium on bio-inspired computing BIC'05, 5-7 September 2005, The Puteri Pan Pacific Hotel Johor Bahru, Malaysiaent://SD_ILS/0/SD_ILS:4498722024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia)<br/>Author International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia), Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat, Soft Computing Research Group, Group on Artificial Immune System and Security<br/>Format: Books<br/>Call Number QA76.618 I89 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>ISBN 9789834279400<br/>Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:2717502024-04-20T16:22:24Z2024-04-20T16:22:24Zby European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary)<br/>Author European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary), Molva, Refik, Tsudik, G. (Gene), Westhoff, Dirk<br/>Format: Books<br/>Call Number TK5102.85 E97 2005<br/>Publisher Springer-Verlag,<br/>Publication Date 2005<br/>ISBN 9783540309123<br/>Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:1433312024-04-20T16:22:24Z2024-04-20T16:22:24Zby IH 2005 ( 2005 : Barcelona, Spain)<br/>Author IH 2005 ( 2005 : Barcelona, Spain), Barni, Mauro<br/>Format: Books<br/>Call Number QA76.9.A25 I534 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540290391<br/>Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedingsent://SD_ILS/0/SD_ILS:1433402024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author International Conference on Information Systems Security( 1st : 2005 : Calcutta, India), Jajodia, Sushil, Mazumdar, Chandan<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540307068<br/>Trustworthy global computing : international symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:946212024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Symposium, TGC 2005 ( 2005 : Edinburgh, UK)<br/>Author International Symposium, TGC 2005 ( 2005 : Edinburgh, UK), De Nicola, Rocco, Sangiorgi, Davide<br/>Format: Books<br/>Call Number QA76.9.A25 T784 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540300076<br/>A data reduction for intrusion detection using principal component analysisent://SD_ILS/0/SD_ILS:3772892024-04-20T16:22:24Z2024-04-20T16:22:24Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Dahliyusmanto, ECTI Annual Conference (1st : 2004 : Pattaya, Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Network control and engineering for QoS, security and mobility : IFIP TC6/WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (Net-Con 2002), October 23-25, 2002, Paris, Franceent://SD_ILS/0/SD_ILS:4101362024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC6/WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France)<br/>Author IFIP TC6/WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France), Gaiti, Dominique, Boukhatem, Nadia<br/>Format: Books<br/>Call Number TK5105.5 I344 2003<br/>Publisher Kluwer Academic Publishers,<br/>Publication Date 2003<br/>ISBN 9781402072680<br/>Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papersent://SD_ILS/0/SD_ILS:3971822024-04-20T16:22:24Z2024-04-20T16:22:24Zby International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands), Blaze, Matt<br/>Format: Books<br/>Call Number HG1710 F56 2003<br/>Publisher Springer-Verlag,<br/>Publication Date 2003<br/>ISBN 9783540006466<br/>Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canadaent://SD_ILS/0/SD_ILS:3486792024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author IFIP World Computer Congress (17th : 2002 : Montreal, Quebec), Nardelli, Enrico, Posadziejewski, Sabina, Talamo, Maurizio<br/>Format: Books<br/>Call Number QA76.9.A25 I36 2003<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2003<br/>ISBN 9781402074936<br/>Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UKent://SD_ILS/0/SD_ILS:3635412024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge)<br/>Author IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge), Gudes, Ehud, Shenoi, Sujeet<br/>Format: Books<br/>Call Number QA76.9.D314 I34 2003<br/>Publisher Kluwer Academic Publishers,<br/>Publication Date 2003<br/>ISBN 9781402075414<br/>Integrity and internal control in Information Systems V : IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germanyent://SD_ILS/0/SD_ILS:3642102024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (5th : 2002 : Bonn, Germany)<br/>Author IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (5th : 2002 : Bonn, Germany), Gertz, Michael<br/>Format: Books<br/>Call Number T58.64 I34 2003<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2003<br/>ISBN 9781402074738<br/>Check point VPN-1/firewall-1 NG : administrationent://SD_ILS/0/SD_ILS:3474142024-04-20T16:22:24Z2024-04-20T16:22:24Zby Shah, Inti<br/>Author Shah, Inti, Ratcliffe, Andrew<br/>Format: Books<br/>Call Number TK5105.59 S52 2003<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072223422<br/>Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedingsent://SD_ILS/0/SD_ILS:3943712024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Information and Communications Security (4th : 2002 : Singapore)<br/>Author International Conference on Information and Communications Security (4th : 2002 : Singapore), Deng, Robert<br/>Format: Books<br/>Call Number QA76.9.A25 I57 2002<br/>Publisher Springer,<br/>Publication Date 2002<br/>ISBN 9783540001645<br/>Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedingsent://SD_ILS/0/SD_ILS:3964772024-04-20T16:22:24Z2024-04-20T16:22:24Zby EUROCRYPT (2002 : Amsterdam, Netherlands)<br/>Author EUROCRYPT (2002 : Amsterdam, Netherlands), Knudsen, Lars<br/>Format: Books<br/>Call Number QA76.9.A25 E87 2002<br/>Publisher Springer-Verlag,<br/>Publication Date 2002<br/>ISBN 9783540435532<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-04-20T16:22:24Z2024-04-20T16:22:24Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-04-20T16:22:24Z2024-04-20T16:22:24Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Digital certificate service using LDAP directoryent://SD_ILS/0/SD_ILS:3224982024-04-20T16:22:24Z2024-04-20T16:22:24Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Son, Yeo Yiin, Mazleena Salleh, Lui, Yeok Peng, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 D53 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security issues of mobile agentsent://SD_ILS/0/SD_ILS:3220712024-04-20T16:22:24Z2024-04-20T16:22:24Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.76.I58 A39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-04-20T16:22:24Z2024-04-20T16:22:24Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementing advance encryption standard (AES) in virtual private network environmentent://SD_ILS/0/SD_ILS:3161932024-04-20T16:22:24Z2024-04-20T16:22:24Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number TK5105.59 N73 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Virtual private network tunneling protocolent://SD_ILS/0/SD_ILS:3221342024-04-20T16:22:24Z2024-04-20T16:22:24Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format: Books<br/>Call Number TK5105.59 N74 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Agent technology approach for proxy serverent://SD_ILS/0/SD_ILS:3311082024-04-20T16:22:24Z2024-04-20T16:22:24Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedingsent://SD_ILS/0/SD_ILS:1594592024-04-20T16:22:24Z2024-04-20T16:22:24Zby Debar, Herve, 1961-<br/>Author Debar, Herve, 1961-, Me, Ludovic, 1963-, Wu, S. Felix, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 R44 2000<br/>Publisher Springer-Verlag,<br/>Publication Date 2000<br/>ISBN 9783540410850<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-04-20T16:22:24Z2024-04-20T16:22:24Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Multimedia systems and applications IIent://SD_ILS/0/SD_ILS:1430202024-04-20T16:22:24Z2024-04-20T16:22:24Zby Tescher, Andrew G.<br/>Author Tescher, Andrew G., The International Society for Optical Engineering, Society of Photo-Optical Instrumentation Engineers<br/>Format: Books<br/>Call Number QA76.575 M856 1999 f<br/>Publisher SPIE,<br/>Publication Date 1999<br/>ISBN 9780819434388<br/>Multimedia systems and applicationsent://SD_ILS/0/SD_ILS:1430262024-04-20T16:22:24Z2024-04-20T16:22:24Zby Tescher, Andrew G.<br/>Author Tescher, Andrew G., The International Society for Optical Engineering, Society of Photo-Optical Instrumentation Engineers<br/>Format: Books<br/>Call Number QA76.575 M855 1998 f<br/>Publisher SPIE,<br/>Publication Date 1999 1998<br/>ISBN 9780819429896<br/>Optimal Construction of unconditionally secure id-based key sharing scheme for large-scale networksent://SD_ILS/0/SD_ILS:3965392024-04-20T16:22:24Z2024-04-20T16:22:24Zby Goichiro, Hanaoka<br/>Author Goichiro, Hanaoka<br/>Format: Books<br/>Call Number MAK 15912<br/>Publication Date 1999<br/>ACOMEN '98 International Conference on Advanced Computational Methods in Engineering, Ghent, 2-4 September 1998ent://SD_ILS/0/SD_ILS:4907572024-04-20T16:22:24Z2024-04-20T16:22:24Zby International Conference on Advanced Computational Methods in Engineering (1998 : Ghent, Belgium)<br/>Author International Conference on Advanced Computational Methods in Engineering (1998 : Ghent, Belgium), Van Keer, R, Vemuri, V. Rao<br/>Format: Books<br/>Call Number TA329 I32 1998<br/>Publisher Shaker Publishing B V,<br/>Publication Date 1998<br/>ISBN 9789042300552<br/>Information security and privacy : Second Australian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997 : proceedingsent://SD_ILS/0/SD_ILS:4741002024-04-20T16:22:24Z2024-04-20T16:22:24Zby Varadharajan, Vijay<br/>Author Varadharajan, Vijay, Pieprzyk, Josef, Mu, Yi, Australian Conference on Information Security and Privacy (2nd : 1997 : Sydney, New South Wales)<br/>Format: Books<br/>Call Number QA76.9.A25 I56 1997<br/>Publisher Springer,<br/>Publication Date 1997<br/>ISBN 9783540632320<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:4169842024-04-20T16:22:24Z2024-04-20T16:22:24Zby Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene<br/>Format: Books<br/>Call Number QA76.76.O63 G37 1996<br/>Edition 2nd ed., expanded & updated<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921481<br/>Security and control of information technology in societyent://SD_ILS/0/SD_ILS:3073692024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia)<br/>Author IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia), Sizer, Richard<br/>Format: Books<br/>Call Number QA76.9.A25 I73 1993<br/>Publisher North-Holland,<br/>Publication Date 1994<br/>ISBN 9780444818317<br/>Computer security : proceedingsent://SD_ILS/0/SD_ILS:3345852024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.), Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I45 1993<br/>Publisher North-Holland,<br/>Publication Date 1993<br/>ISBN 9780444817488<br/>Database security, V1 : status and prospectsent://SD_ILS/0/SD_ILS:3345612024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP WG 11.3 Workshop on Database Security (6th : 1992 : Vancouver, Canada)<br/>Author IFIP WG 11.3 Workshop on Database Security (6th : 1992 : Vancouver, Canada), Thuraisingham, Bhavani M., Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D314 I45 1992<br/>Publisher North-Holland,<br/>Publication Date 1992<br/>ISBN 9780444898890<br/>Computer security and information integrityent://SD_ILS/0/SD_ILS:2504622024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland), Dittrich, Klaus R., Rautakivi, Seppo, Saari, Juhani<br/>Format: Books<br/>Call Number QA76.9.A25 I44 1991<br/>Publisher Elseview Science Pub.,<br/>Publication Date 1991<br/>ISBN 9780444888594<br/>Database security, III : status and prospectsent://SD_ILS/0/SD_ILS:1694792024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.)<br/>Author IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.), Spooner, David L., Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D314 I45 1989<br/>Publisher North-Holland,<br/>Publication Date 1990<br/>ISBN 9780444887016<br/>Kertas kerja Seminar Keselamatan Komputerent://SD_ILS/0/SD_ILS:2582452024-04-20T16:22:24Z2024-04-20T16:22:24Zby Seminar Keselamatan Komputer (1990 : UTM, Sekudai)<br/>Author Seminar Keselamatan Komputer (1990 : UTM, Sekudai), Universiti Teknologi Malaysia. Institut Sains Komputer<br/>Format: Books<br/>Call Number QA76.9.A25 S45 1990 af<br/>Publisher UTM,<br/>Publication Date 1990<br/>Security and protection in information systement://SD_ILS/0/SD_ILS:4546232024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco), Grissonnanche, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 I34 1986<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444873453<br/>Computer security in the age of informationent://SD_ILS/0/SD_ILS:2662192024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland), Caelli, William, International Federation for Information Processing<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1988<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444883247<br/>Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988ent://SD_ILS/0/SD_ILS:2366272024-04-20T16:22:24Z2024-04-20T16:22:24Zby Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format: Books<br/>Call Number QA76.9.A25 A39 1988<br/>Publisher Computer Society Press,<br/>Publication Date 1988<br/>ISBN 9780818608957<br/>Database security : status and prospectsent://SD_ILS/0/SD_ILS:2955532024-04-20T16:22:24Z2024-04-20T16:22:24Zby Landwehr, Carl E.<br/>Author Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D32 D37 1988<br/>Publisher North Holland,<br/>Publication Date 1988<br/>ISBN 9780444704795<br/>Proceedings of the Symposium on Security and Privacy, 1985, Oakland, Californiaent://SD_ILS/0/SD_ILS:1893952024-04-20T16:22:24Z2024-04-20T16:22:24Zby Symposium on Security and Privacy (1985 : Oakland, California)<br/>Author Symposium on Security and Privacy (1985 : Oakland, California)<br/>Format: Books<br/>Call Number TK7885.S42 1985f<br/>Publisher IEEE Computer Soc,<br/>Publication Date 1985<br/>ISBN 9780818606298<br/>Computer security : a global challengeent://SD_ILS/0/SD_ILS:2960852024-04-20T16:22:24Z2024-04-20T16:22:24Zby IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada), Finch, James H., Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1984<br/>Publisher North Holland,<br/>Publication Date 1984<br/>ISBN 9780444876188<br/>Computer security and integrity : proceedingsent://SD_ILS/0/SD_ILS:3567672024-04-20T16:22:24Z2024-04-20T16:22:24Zby Symposium on Trends and Applications (1977 : Maryland)<br/>Author Symposium on Trends and Applications (1977 : Maryland), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1977 f<br/>Publisher IEEE,<br/>Publication Date 1977<br/>Client/server image protection system using hybrid security approach : steganography & cryptographyent://SD_ILS/0/SD_ILS:1689182024-04-20T16:22:24Z2024-04-20T16:22:24Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number belum proses<br/>Computer security : computer crime is a threat to be recognized by everyoneent://SD_ILS/0/SD_ILS:3905932024-04-20T16:22:24Z2024-04-20T16:22:24Zby Mohd. Daud Kasmuni<br/>Author Mohd. Daud Kasmuni, Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 11739 a<br/>The need for securityent://SD_ILS/0/SD_ILS:1041142024-04-20T16:22:24Z2024-04-20T16:22:24Zby The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author The Housley Computer Network Security Seminar (1987 : Melbourne), Davies, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 H68 1987 f<br/>