Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer Science
(11)
Computer science
(11)
Data Encryption
(11)
Data encryption (Computer science)
Data protection
(11)
Electronic books
(11)
more ...
Additional Suggested Topics
... within your search.
Information systems
Systems and Data Security
(11)
Computer Appl. in Administrative Data Processing
(8)
e-Commerce/e-business
(6)
Computer Communication Networks
(5)
Computers and Society
(3)
Information Systems and Communication Service
(3)
Coding and Information Theory
(2)
Coding theory
(2)
Data Structures, Cryptology and Information Theory
(2)
Data structures (Computer science)
(2)
Information Systems Applications (incl. Internet)
(2)
Software engineering
(2)
Special Purpose and Application-Based Systems
(2)
Computer Science, general
(1)
Information Systems
(1)
Management of Computing and Information Systems
(1)
less ...
Showing
1
-
11
of
11
for search:
''
, query time: 0.6s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Automatic Malware Analysis An Emulator Based Approach /
by
Yin, Heng
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Android Malware
by
Jiang, Xuxian
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security and the Networked Society
by
Gregory, Mark A
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2013
Suggested Topics: Information systems
Suggested Topics: Data encryption (Computer science)
Institution
KMUTT
(11)
Call Number
Q - Science
(11)
Author
Gregory, Mark A
(1)
Jiang, Xuxian
(1)
Yin, Heng
(1)
Language
English
(11)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website