Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer networks
Computer security
Electronic books
(24)
Congresses
(20)
Data encryption (Computer science)
(11)
Data protection
(4)
more ...
Additional Suggested Topics
... within your search.
Information technology
(4)
Computers
(2)
Database management
(2)
Microsoft Windows (Computer file)
(2)
Application logging (Computer science)
(1)
Component software
(1)
Computer Communication Networks
(1)
Computer crimes
(1)
Confidential communications
(1)
Data encryption (Computer science)|
(1)
Game theory
(1)
Microsoft software
(1)
Operating systems (Computers)
(1)
Telecommunication systems
(1)
Uncertainty (Information theory)
(1)
Web sites
(1)
less ...
Showing
1
-
20
of
32
for search:
''
, query time: 0.72s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Physical-layer security from information theory to security engineering /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Hacking exposed : web application security secrets and solutions /
by
Scambray, Joel
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Introduction to security and network forensics /
by
Buchanan, William
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Intrusion detection : a machine learning approach /
by
Yu, Zhenwei
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Engineering information security : the application of systems engineering concepts to achieve information assurance /
by
Jacobs, Stuart
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Microsoft Windows security : essentials /
by
Gibson, Darril
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
by
Carvey, Harlan
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Readings and cases in information security : law and ethics /
by
Whitman, Michael E
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Moving target defense creating asymmetric uncertainty for cyber threats /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Bootstrapping trust in modern computers
by
Parno, Bryan
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Future challenges in security and privacy for academia and industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9,...
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trust management V 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 – July 1, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure and trust computing, data management and applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure and trust computing, data management, and applications STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security and assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Applied information security a hands-on approach /
by
Basin, David
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011,...
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Managing the dynamics of networks and services 5th International conference on autonomous iInfrastructure, management, and security, AIMS 2011, Nancy, France, June 13-17, 2011....
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Critical information infrastructures security 5th International workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. revised papers /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011. proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2011
Suggested Topics: Computer networks
Suggested Topics: Computer security
Institution
KMUTT
(32)
Call Number
Q - Science
(25)
T - Technology
(7)
Author
Basin, David
(1)
Buchanan, William
(1)
Carvey, Harlan
(1)
Gibson, Darril
(1)
Jacobs, Stuart
(1)
more ...
Parno, Bryan
(1)
Scambray, Joel
(1)
Whitman, Michael E
(1)
Yu, Zhenwei
(1)
less ...
Language
English
(32)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website