Limit search to items available for checkout
Nearby Call Numbers are:
Result Page   Prev Next
Save Marked Records Save All On Page
Mark   Media Year
QA76.9.A25 I57 2011    
      Information security and cryptology : 7th international conference, Inscrypt 2011, Beijing, China, No Inscrypt (Conference)  BOOK c2012
      Information security and cryptology : 7th international conference, Inscrypt 2011, Beijing, China, No Inscrypt (Conference)  BOOK c2012
QA76.9.A25 I57 2012 : Internet     
      Information security and cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, No Inscrypt (Conference)  E-BOOK 2013
QA76.9.A25 I573 2007    
      Advances in information and computer security : Second International Workshop on Security, IWSEC 2007 International Workshop on Security  BOOK c2007
      Advances in information and computer security : Second International Workshop on Security, IWSEC 2007 International Workshop on Security  BOOK c2007
QA76.9.A25 I573 2008    
      Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, International Workshop on Security  BOOK 2008
      Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, International Workshop on Security  BOOK 2008
QA76.9.A25 I573 2009    
      Advances in information and computer security: 4th International Workshop on Security, IWSEC 2009 Toy International Workshop on Security  BOOK 2009
      Advances in information and computer security: 4th International Workshop on Security, IWSEC 2009 Toy International Workshop on Security  BOOK 2009
QA76.9.A25 I573 2010    
      Advances in information and computer security : 5th international workshop on security, IWSEC 2010, K International Workshop on Security  BOOK 2010
      Advances in information and computer security : 5th international workshop on security, IWSEC 2010, K International Workshop on Security  BOOK 2010
QA76.9.A25 I573 2011    
      Advances in information and computer security : 6th International workshop, IWSEC 2011, Tokyo, Japan, International Workshop on Security  BOOK 2011
      Advances in information and computer security : 6th International workshop, IWSEC 2011, Tokyo, Japan, International Workshop on Security  BOOK 2011
QA76.9.A25 I573 2012    
      Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, F International Workshop on Security  BOOK c2012
      Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, F International Workshop on Security  BOOK c2012
QA76.9.A25 I5735 : Internet     
      Security Measurements and Metrics (Metrisec), International Workshop on [electronic resource].   E-PERIODICAL  
QA76.9.A25 I574 2002    
      Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers / International Workshop on Security Protocols  BOOK c2004
      Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers / International Workshop on Security Protocols  BOOK c2004
QA76.9.A25 I574 2005    
      Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected p International Workshop on Security Protocols  BOOK 2005
      Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected International Workshop on Security Protocols  BOOK c2007
      Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected p International Workshop on Security Protocols  BOOK 2005
      Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected International Workshop on Security Protocols  BOOK c2007
QA76.9.A25 I574 2006    
      Security protocols : 14th international workshop, Cambridge, March 27-29 2006, revised selected paper International Workshop on Security Protocols  BOOK 2009
      Security protocols : 14th international workshop, Cambridge, March 27-29 2006, revised selected paper International Workshop on Security Protocols  BOOK 2009
QA76.9.A25 I574 2007    
      Security protocols : 15th international workshop, Brno, Czech Republic, April 18-20, 2007: revised se International Workshop on Security Protocols  BOOK 2010
      Security protocols : 15th international workshop, Brno, Czech Republic, April 18-20, 2007: revised se International Workshop on Security Protocols  BOOK 2010
QA76.9.A25 I574 2008    
      Security protocols : 16th International Workshop Cambridge, UK, April 16-18, 2008 ; Revised selected International Workshop on Security Protocols  BOOK 2011
      Security protocols : 16th International Workshop Cambridge, UK, April 16-18, 2008 ; Revised selected International Workshop on Security Protocols  BOOK 2011
QA76.9.A25 I574 2011    
      Security protocols XIX : 19th international workshop, Cambridge, UK, March 28-30, 2011, revised selec International Workshop on Security Protocols  BOOK c2011
      Security protocols XIX : 19th international workshop, Cambridge, UK, March 28-30, 2011, revised selec International Workshop on Security Protocols  BOOK c2011
QA76.9.A25 I574 2013 : Internet     
      Security protocols XXI : 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selec International Workshop on Security Protocols  E-BOOK 2013
QA76.9.A25 I574 2014 : Internet     
      Security protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised sele International Workshop on Security Protocols  E-BOOK 2014
QA76.9.A25 I575 : Internet     
      Inside cybersecurity [electronic resource].   E-PERIODICAL  
QA76.9.A25 I58    
      Intelligence and Security Informatics Conference (JISIC), IEEE Joint [electronic resource].   E-PERIODICAL  
      International journal of information security science [electronic resource].   E-PERIODICAL  
QA76.9.A25 I58 2009    
      Trusted systems : first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 INTRUST (Conference)  BOOK c2010
      Security protocols XVII : 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised select International Workshop on Security Protocols  E-BOOK 2013
      Trusted systems : first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 INTRUST (Conference)  BOOK c2010
QA76.9.A25 I58 2010    
      Trusted systems : second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 INTRUST (Conference)  BOOK 2011
      Trusted systems : second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 INTRUST (Conference)  BOOK 2011
QA76.9.A25 I58 2012eb : Internet     
      Pairing-based cryptography-- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18 International Conference on Pairing-Based Cryptography  E-BOOK 2013
QA76.9.A25 I58 2013    
      Intelligent systems for security informatics / Christopher C. Yang...[et al.]. Yang, Christopher C.  BOOK c2013
      Intelligent systems for security informatics / Christopher C. Yang...[et al.]. Yang, Christopher C.  BOOK c2013
      Pairing-based cryptography-- Pairing 2013 : 6th International Conference, Beijing, China, November 22 International Conference on Pairing-Based Cryptography  E-BOOK 2014
      Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Ca International Conference on Cryptology in Africa  E-BOOK 2013
2 additional entries    
QA76.9.A25 .I58 2013eb    
      Availability, reliability, and security in information systems and HCI : IFIP WG 8.4, 8.9, TC 5 Inter International Cross-Domain Conference and Workshop on Availability, Reliability, and Security  E-BOOK 2013
      Human aspects of information security, privacy, and trust : first International Conference, HAS 2013, HAS (Conference)  E-BOOK 2013
      Intelligent systems for security informatics / Christopher C. Yang [and others].   E-BOOK 2013
QA76.9.A25 I58 2014 : Internet     
      Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December ICISS (Conference)  E-BOOK 2014
QA76.9.A25 I58 2014eb : Internet     
      Trusted systems : sixth International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, INTRUST (Conference)  E-BOOK 2015
QA76.9.A25 I58 2015eb    
      Progress in cryptology - LATINCRYPT 2014 : third International Conference on Cryptology and Informati International Conference on Cryptology and Information Security in Latin America  E-BOOK 2015
      Public-key cryptography -- PKC 2015 : 18th IACR International Conference on Practice and Theory in Pu International Workshop on Practice and Theory in Public-Key Cryptography  E-BOOK 2015
      Trusted systems : 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Rev INTRUST (Conference)  E-BOOK 2016
QA76.9.A25 I58 2016 : Internet     
      Progress in cryptology -- INDOCRYPT 2016 : 17th International Conference on Cryptology in India, Kolk International Conference in Cryptology in India  E-BOOK 2016
QA76.9.A25 I58 2016eb    
      Public-key cryptography -- PKC 2016 : 19th IACR International Conference on Practice and Theory in Pu International Workshop on Practice and Theory in Public Key Cryptography  E-BOOK 2016
      Public-key cryptography -- PKC 2016 : 19th IACR International Conference on Practice and Theory in Pu International Workshop on Practice and Theory in Public Key Cryptography  E-BOOK 2016
QA76.9.A25 I58 2017    
      Security with intelligent computing and big-data services / Sheng-Lung Peng, Shiuh-Jeng Wang, Valenti International Conference on Security with Intelligent Computing and Big-data Services  BOOK 2018
      Security with intelligent computing and big-data services / Sheng-Lung Peng, Shiuh-Jeng Wang, Valenti International Conference on Security with Intelligent Computing and Big-data Services  BOOK 2018
QA76.9.A25 I583 2012    
      Security, privacy, and applied cryptography engineering : second international conference, SPACE 2012 International Conference on Security, Privacy and Applied Cryptography Engineering  BOOK c2012
      Security, privacy, and applied cryptography engineering : second international conference, SPACE 2012 International Conference on Security, Privacy and Applied Cryptography Engineering  BOOK c2012
QA76.9.A25 .I584    
      Availability, Reliability and Security, ARES, International Conference on [electronic resource].   E-PERIODICAL  
      Communications and Intelligence Information Security (ICCIIS), International Conference on [electroni   E-PERIODICAL  
      Computer and Communications Security (ICCCS), International Conference on [electronic resource].   E-PERIODICAL  
      Information Theory and Information Security (ICITIS), IEEE International Conference on [electronic re   E-PERIODICAL  
      Proceedings [electronic resource] / International Conference on IT Security Incident Management & IT International Conference on IT Security Incident Management & IT Forensics.  E-PERIODICAL  
QA76.9.A25 I585 2002eb : Internet     
      An introduction to security in a CSM 1.3 for AIX 5L environment / [Octavian Lascu and others].   E-BOOK 2002
QA76.9.A25 I585 2011    
      Computational intelligence in security for information systems : 4th International Conference, CISIS International Conference on Computational Intelligence in Security for Information Systems  BOOK 2011
      Computational intelligence in security for information systems : 4th International Conference, CISIS International Conference on Computational Intelligence in Security for Information Systems  BOOK 2011
QA76.9.A25 I595 2013eb : Internet     
      Trusted systems : 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013 : pro INTRUST (Conference)  E-BOOK 2013
QA76.9.A25 I63 2021eb : Internet     
      Information security and optimization / edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, S   E-BOOK 2021
QA76.9.A25 I64 2008eb : Internet     
      Information security management principles : an ISEB certificate / Andy Taylor (editor) [and others].   E-BOOK 2008
QA76.9.A25 I66 : Internet     
      Innovation and Challenges in Cyber Security (ICICCS-INBUSH), International Conference on [electronic   E-PERIODICAL  
QA76.9.A25 I668 : Internet     
      Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), International Conference on [el   E-PERIODICAL  
QA76.9.A25 I75 : Internet     
      Software Engineering for Secure Systems (SESS), International Workshop on [electronic resource].   E-PERIODICAL  
QA76.9.A25 I82 2015eb : Internet     
      Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China, November ISCTCS (Conference)  E-BOOK 2015
QA76.9.A25 I83 2009    
      Information security and digital forensics : first international conference, ISDF 2009, London, Unite ISDF (Conference)  BOOK c2010
      Information security and digital forensics : first international conference, ISDF 2009, London, Unite ISDF (Conference)  BOOK c2010
QA76.9.A25 I83 2012 : Internet     
      Trustworthy computing and services : International Conference, ISCTCS 2012, Beijing, China, May 28-Ju ISCTCS (Conference)  E-BOOK 2013
QA76.9.A25 I84 : Internet     
      ISEA ASIA SECURITY AND PRIVACY (ISEASP) [electronic resource].   E-PERIODICAL  
QA76.9.A25 I85 2002    
      Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-Octobe ISC (Conference : Information security)  BOOK c2002
      Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-Octobe ISC (Conference : Information security)  BOOK c2002
Save Marked Records Save All On Page
Result Page   Prev Next