2011, ISBN 0521516501, Volume 9780521516501, xvi, 329
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new...
Security measures | Computer security | Computer networks | Telecommunication systems
Security measures | Computer security | Computer networks | Telecommunication systems
Book
2016, ISBN 9780190665012, vii, 290 pages
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this...
Networking | COMPUTERS | General | Computer networks | Internet | Security | Computer security | Security measures | International Relations | Cyber attacks | Cybersecurity dilemma | Snowden | Counterintelligence | Cybersecurity | Hacking | International security | Security dilemma | Cyber operations
Networking | COMPUTERS | General | Computer networks | Internet | Security | Computer security | Security measures | International Relations | Cyber attacks | Cybersecurity dilemma | Snowden | Counterintelligence | Cybersecurity | Hacking | International security | Security dilemma | Cyber operations
Book
IEEE security & privacy, ISSN 1540-7993, 2003
Journal
2009, 1. Aufl., ISBN 9780470027486, xxiii, 257
This book provides an in-depth guide to security in wireless ad hoc and sensor networksSecurity in Wireless Ad Hoc and Sensor Networksintroduces the reader to...
Communication, Networking and Broadcast Technologies | Computing and Processing | Security measures | Computer networks | Ad hoc networks (Computer networks) | Security
Communication, Networking and Broadcast Technologies | Computing and Processing | Security measures | Computer networks | Ad hoc networks (Computer networks) | Security
Book
5.
Security integration in Europe
: how knowledge-based networks are transforming the European Union
2011, ISBN 9780472117895, cm.
At a time when many observers question the EU's ability to achieve integration of any significance, and indeed Europeans themselves appear disillusioned, Mai'a...
Security, International--European Union countries--Planning | Policy networks--European Union countries | National security--European Union countries--Planning--International cooperation | Internal security--European Union countries--Planning--International cooperation | International cooperation | European Union countries | Planning | Security, International | History | Policy networks | National security | Internal security | Political Science | World | European | Security (National & International) | POLITICAL SCIENCE | Europe | HISTORY
Security, International--European Union countries--Planning | Policy networks--European Union countries | National security--European Union countries--Planning--International cooperation | Internal security--European Union countries--Planning--International cooperation | International cooperation | European Union countries | Planning | Security, International | History | Policy networks | National security | Internal security | Political Science | World | European | Security (National & International) | POLITICAL SCIENCE | Europe | HISTORY
Book
2003, Lecture notes in computer science, ISBN 3540007164, Volume 2587., xi, 536
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in...
Cryptography | Computer security | Congresses | Data encryption (Computer science) | Operating systems (Computers) | Computer software | Discrete Mathematics in Computer Science | Information Systems | Management of Computing and Information Systems | Computer Communication Networks | Computational complexity | Cryptology | Algorithm Analysis and Problem Complexity | Operating Systems
Cryptography | Computer security | Congresses | Data encryption (Computer science) | Operating systems (Computers) | Computer software | Discrete Mathematics in Computer Science | Information Systems | Management of Computing and Information Systems | Computer Communication Networks | Computational complexity | Cryptology | Algorithm Analysis and Problem Complexity | Operating Systems
eBook
2005, Lecture notes in computer science, ISBN 3540262261, Volume 3506., xiv, 490
Constitutes the refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Seoul, Korea in...
Cryptography | Computer security | Congresses | Discrete Mathematics in Computer Science | Data Encryption | Computer Science | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computer Communication Networks | Operating Systems
Cryptography | Computer security | Congresses | Discrete Mathematics in Computer Science | Data Encryption | Computer Science | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computer Communication Networks | Operating Systems
eBook
2011, ISBN 1597495921, xxiv, 290
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of...
Cloud computing | Computer networks | Computer security | Security measures
Cloud computing | Computer networks | Computer security | Security measures
Book
2013, ISBN 1597499986, xxii, 202
"Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the...
Smart power grids | Security measures | Computer networks | Computer Communications & Networking
Smart power grids | Security measures | Computer networks | Computer Communications & Networking
Book
2004, Lecture notes in computer science, ISBN 9783540229872, Volume 3193., x, 456
eBook
2007, ISBN 1846285909, xiii, 243
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the...
Portable computers | Computer networks | Security measures | Java (Computer program language) | Mobile computing | Internet | Information Systems Applications (incl.Internet) | Computer Systems Organization and Communication Networks | Computer Applications | Data Encryption | Computer Science | Software Engineering/Programming and Operating Systems | Information Systems and Communication Service
Portable computers | Computer networks | Security measures | Java (Computer program language) | Mobile computing | Internet | Information Systems Applications (incl.Internet) | Computer Systems Organization and Communication Networks | Computer Applications | Data Encryption | Computer Science | Software Engineering/Programming and Operating Systems | Information Systems and Communication Service
Book
2015, Second edition., ISBN 9781118817636, xix, 376 pages
Book
2014, What everyone needs to know, ISBN 9780199918096, viii, 306 pages
"The book is structured around the driving questions of cybersecurity: how it all works, why it all matters, and what can we do. Along the way, they take...
Prevention | Cyberspace operations (Military science) | Cyberterrorism | Cyberspace | POLITICAL SCIENCE / Political Freedom & Security / International Security | Computer networks | Computer security | Information warfare | Security measures
Prevention | Cyberspace operations (Military science) | Cyberterrorism | Cyberspace | POLITICAL SCIENCE / Political Freedom & Security / International Security | Computer networks | Computer security | Information warfare | Security measures
Book
2011, ISBN 0820340677, xviii, 331
Book
2014, ISBN 0128000112, xiii, 132 pages
Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity...
Computers | Access control | Computer networks | Computer security | Security measures | Data protection
Computers | Access control | Computer networks | Computer security | Security measures | Data protection
Book
2013, 1. Aufl., Computer communications and networks, ISBN 1447157931, xvi, 306
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text...
Cloud computing | Privacy | Internet | Security measures | Information technology | Computer security | Web services
Cloud computing | Privacy | Internet | Security measures | Information technology | Computer security | Web services
Book
2010, ISBN 1849280355, xii, 400
Book