101
Published 2005
Springer US
...Computer Security in the 21st Century shares some of the emerging important research trends...

102
Published 2002
Springer US
... for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security...

103
by Viega, John
Published 2009
O'Reilly Media
Subjects: ...Computer security...

104
by Vacca, John
Published 2020
CRC Press
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

105
Published 2023
Springer International Publishing

106
Published 2024
Springer Nature Switzerland
... International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer...

107
Published 2024
Springer Nature Switzerland
... International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer...

108
Published 2022
Springer International Publishing

109
Published 2006
Springer London
... in computer security and will be of interest to researchers and practitioners, as well students. ‘Dr. Maloof...

110
by Schou, Corey
Published 2015
McGraw-Hill Education
Subjects: ...Computer security / Handbooks, manuals, etc...

111
by Mansourov, Nikolai
Published 2010
Morgan Kaufmann
Subjects: ...Computer security...

112
by Provos, Niels
Published 2007
Addison-Wesley
Subjects: ...Computer security...

113
by Mitra, Pinaki
Published 2018
IntechOpen
Subjects: ...Computer security...

114
by Yang, Jucheng
Published 2012
IntechOpen
Subjects: ...Computer security...

115
by Delac, Kresimir
Published 2008
IntechOpen
Subjects: ...Computer security...

116
by Ramakrishnan, S.
Published 2016
IntechOpen
Subjects: ...Computer security...

117
by Dey, Indrakshi
Published 2022
IntechOpen
Subjects: ...Computer security...

118
by Kalloniatis, Christos
Published 2020
IntechOpen
Subjects: ...Computer security...

119
by Oravec, Milos
Published 2010
IntechOpen
Subjects: ...Computer security...

120
by Parker, Carey
Published 2023
Apress
Table of Contents: ... -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice...