Refine your search
Availability
-
Authors
- Agrawal, Shweta
- Atluri, Vijayalakshmi
- Batina, Lejla
- Bertino, Elisa
- Chen, Xiaofeng
- European Commission
- Furnell, Steven
- Garcia-Alfaro, Joaquin
- Guo, Jian
- Jensen, Christian D.
- Lopez, Javier
- Meng, Weizhi
- Picek, Stjepan
- Steinfeld, Ron
- Su, Chunhua
- Sun, Xingming
- United States
- Xia, Zhihua
- Zhang, Liang-Jie
- Zhang, Xiaorui
- Show more
- Show less
-
Item types
-
Locations
- Foreign Official Documents - American Documents
- Annexe Reading Room & Stack Division
- Bengali - Books - Main Stack Division
- EC
- Foreign Official Documents - United Nations
- G
- Mal
- New English - Main Stack Division
- New English Oversized - Main Stack Division
- Online Resource
- Reading Room - Main Reading Room
- ST
- US
- Show more
- Show less
-
Places
-
Series
- Advanced Sciences and Technologies for Security Applications
- Advances in Information Security
- Artech House communications law and policy series
- Communications in Computer and Information Science
- Emerald studies in finance, insurance, and risk management
- Future of Business and Finance
- IFIP Advances in Information and Communication Technology
- Information Security and Cryptography
- Information Systems and Applications, incl. Internet/Web, and HCI
- Ipolitics
- Lecture Notes in Artificial Intelligence
- Lecture Notes in Business Information Processing
- Lecture Notes in Computer Science
- Lecture Notes in Electrical Engineering
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- MIR;
- Security and Cryptology
- SpringerBriefs in Computer Science
- Tata McGraw -Hill edition serise
- Water pollution control research series
- Show more
- Show less
-
Topics
- Application software
- Artificial Intelligence
- Artificial intelligence
- Computer Communication Networks
- Computer Engineering and Networks
- Computer and Information Systems Applications
- Computer engineering
- Computer networks
- Computer networksÂ
- Computer science
- Computer security
- Cryptography
- Cryptology
- Data and Information Security
- Data encryption (Computer science)
- Data processing
- Data protection
- Law and legislation
- Mobile and Network Security
- Security measures
- Show more
- Show less
-
Collections
-
Holding libraries
-
Languages
