Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer networks
Data encryption (Computer science)
Computer security
(15)
Electronic books
(15)
Congresses
(12)
Coding theory
(2)
more ...
Additional Suggested Topics
... within your search.
Database management
(2)
Security measures
(2)
Ciphers
(1)
Computer Communication Networks
(1)
Computer network protocols
(1)
Congresses and conventions
(1)
Cryptography
(1)
Data protection
(1)
Data structures (Computer science)
(1)
Electronic book
(1)
Software engineering
(1)
UNIX Shells
(1)
less ...
Showing
1
-
19
of
19
for search:
''
, query time: 0.55s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Trust management V 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 – July 1, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure and trust computing, data management and applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure and trust computing, data management, and applications STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Applied information security a hands-on approach /
by
Basin, David
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011,...
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Applied cryptography and network security 9th International conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security and trust management[electronic resource] : 7th International workshop, STM 2010, Athens, Greece, September 23-24, 2010, revised selected papers /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security 14th International conference, ISC 2011, Xi’an, China, October 26-29, 2011. proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information and communications security 13th International conference, ICICS 2011, Beijing, China, November 23-26, 2011. proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trusted systems second International conference, INTRUST 2010, Beijing, China, December 13-15, 2010, revised selected papers /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Cryptology and network security 10th International conference, CANS 2011, Sanya, China, December 10-12, 2011. proceedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information systems security 7th International conference, ICISS 2011, Kolkata, India, December 15-19, 2011, procedings /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security protocols XIX 19th International workshop, Cambridge, UK, March 28-30, 2011, revised selected papers /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
SSH, the secure shell : the definitive guide /
by
Barrett, Daniel J
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Network security
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Cryptography infosec pro guide /
by
Oriyano, Sean-Philip
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Engineering secure two-party computation protocols design, optimization, and applications of efficient secure function evaluation /
by
Schneider, Thomas
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Next generation SSH2 implementation : securing data in motion /
by
Liu, Dale
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Network computing and information security : second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Data encryption (Computer science)
Suggested Topics: Computer networks
Institution
KMUTT
(19)
Library
mai
(2)
Format
EBOOKS
(1)
MONOGRAPHS
(1)
Call Number
Q - Science
(15)
T - Technology
(3)
Z - Library Science
(1)
Author
Barrett, Daniel J
(1)
Basin, David
(1)
Liu, Dale
(1)
Oriyano, Sean-Philip
(1)
Schneider, Thomas
(1)
Language
English
(19)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website