Books on the topic 'Applications security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Applications security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Choi, Dooho, and Sylvain Guilley, eds. Information Security Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1.
Full textYou, Ilsun, ed. Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39303-8.
Full textKim, Yongdae, Heejo Lee, and Adrian Perrig, eds. Information Security Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9.
Full textChung, Kyo-Il, Kiwook Sohn, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6.
Full textYoum, Heung Youl, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9.
Full textLee, Dong Hoon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35416-8.
Full textKim, Sehun, Moti Yung, and Hyung-Woo Lee, eds. Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5.
Full textChung, Yongwha, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17955-6.
Full textLee, Jae Kwang, Okyeon Yi, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71093-6.
Full textSong, Joo-Seok, Taekyoung Kwon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938.
Full textLim, Chae Hoon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b103174.
Full textYou, Ilsun, ed. Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9.
Full textChae, Ki-Joon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b95188.
Full textKang, Brent ByungHoon, and Taesoo Kim, eds. Information Security Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93563-8.
Full textKim, Ho-won, and Dooho Choi, eds. Information Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2.
Full textRhee, Kyung-Hyune, and Jeong Hyun Yi, eds. Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1.
Full textJung, Souhwan, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7.
Full textKang, Brent ByungHoon, and JinSoo Jang, eds. Information Security Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3.
Full textCorsi, Carlo, and Fedir Sizov, eds. THz and Security Applications. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8828-1.
Full textOpen source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.
Find full textInc, NetLibrary, ed. Smart card security and applications. 2nd ed. Artech House, 2001.
Find full textGudes, Ehud, and Jaideep Vaidya, eds. Data and Applications Security XXIII. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9.
Full textDamiani, Ernesto, and Peng Liu, eds. Data and Applications Security XX. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588.
Full textPalestini, Claudio, ed. Advanced Technologies for Security Applications. Springer Netherlands, 2020. http://dx.doi.org/10.1007/978-94-024-2021-0.
Full textMödersheim, Sebastian, and Catuscia Palamidessi, eds. Theory of Security and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27375-9.
Full textDe Capitani di Vimercati, Sabrina, Indrakshi Ray, and Indrajit Ray, eds. Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/b116220.
Full textLaud, Peeter, ed. Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29615-4.
Full textAura, Tuomas, Kimmo Järvinen, and Kaisa Nyberg, eds. Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27937-9.
Full textJajodia, Sushil, and Duminda Wijesekera, eds. Data and Applications Security XIX. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706.
Full textAtluri, Vijay, ed. Data and Applications Security XXII. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70567-3.
Full textBarker, Steve, and Gail-Joon Ahn, eds. Data and Applications Security XXI. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73538-0.
Full textGarfinkel, Simson. RFID: Applications, security, and privacy. Addison-Wesley, 2006.
Find full textRecx. Hands-on oracle application express security: Building secure apex applications. Wiley, 2013.
Find full textVincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. McGraw-Hill, 2011.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Springer-Verlag US, 2009.
Find full textStallings, William. Network security essentials: Applications and standards. 4th ed. Prentice Hall, 2011.
Find full textKrzysztof, Iniewski, ed. Smart grid: Applications, communications, and security. Wiley, 2012.
Find full textWilliam, Stallings. Network security essentials: Applications and standards. 4th ed. Pearson Prentice Hall, 2011.
Find full textWilliam, Stallings. Network security essentials: Applications and standards. 3rd ed. Pearson Education, 2007.
Find full textWyld, David C., Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, and Dhinaharan Nagamalai, eds. Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6.
Full textShankar Sriram, V. S., V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, and Gang Li, eds. Applications and Techniques in Information Security. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0871-4.
Full textSencar, Husrev Taha, Sergio Velastin, Nikolaos Nikolaidis, and Shiguo Lian, eds. Intelligent Multimedia Analysis for Security Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11756-5.
Full textByrnes, Jim, and Gerald Ostheimer, eds. Advances in Sensing with Security Applications. Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/1-4020-4295-7.
Full textGolovin, Alexander A., and Alexander A. Nepomnyashchy, eds. Advances in Sensing with Security Applications. Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/1-4020-4355-4.
Full textMayes, Keith, and Konstantinos Markantonakis, eds. Smart Cards, Tokens, Security and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8.
Full textNikolelis, Dimitrios P., and Georgia-Paraskevi Nikoleli, eds. Biosensors for Security and Bioterrorism Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28926-7.
Full textDegano, Pierpaolo, and Luca Viganò, eds. Foundations and Applications of Security Analysis. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03459-6.
Full text