To see the other types of publications on this topic, follow the link: Applications security.

Books on the topic 'Applications security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Applications security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Chae, Kijoon. Information Security Applications. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Dooho, and Sylvain Guilley, eds. Information Security Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

You, Ilsun, ed. Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39303-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Yongdae, Heejo Lee, and Adrian Perrig, eds. Information Security Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chung, Kyo-Il, Kiwook Sohn, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Youm, Heung Youl, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Dong Hoon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35416-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Sehun, Moti Yung, and Hyung-Woo Lee, eds. Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chung, Yongwha, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17955-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Jae Kwang, Okyeon Yi, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71093-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Song, Joo-Seok, Taekyoung Kwon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lim, Chae Hoon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b103174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

You, Ilsun, ed. Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chae, Ki-Joon, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b95188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kang, Brent ByungHoon, and Taesoo Kim, eds. Information Security Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93563-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Ho-won, and Dooho Choi, eds. Information Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rhee, Kyung-Hyune, and Jeong Hyun Yi, eds. Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jung, Souhwan, and Moti Yung, eds. Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kang, Brent ByungHoon, and JinSoo Jang, eds. Information Security Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Corsi, Carlo, and Fedir Sizov, eds. THz and Security Applications. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8828-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Open source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Smart card security and applications. Artech House, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Inc, NetLibrary, ed. Smart card security and applications. 2nd ed. Artech House, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gudes, Ehud, and Jaideep Vaidya, eds. Data and Applications Security XXIII. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Damiani, Ernesto, and Peng Liu, eds. Data and Applications Security XX. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Palestini, Claudio, ed. Advanced Technologies for Security Applications. Springer Netherlands, 2020. http://dx.doi.org/10.1007/978-94-024-2021-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mödersheim, Sebastian, and Catuscia Palamidessi, eds. Theory of Security and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27375-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

De Capitani di Vimercati, Sabrina, Indrakshi Ray, and Indrajit Ray, eds. Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/b116220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Laud, Peeter, ed. Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29615-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Aura, Tuomas, Kimmo Järvinen, and Kaisa Nyberg, eds. Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27937-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jajodia, Sushil, and Duminda Wijesekera, eds. Data and Applications Security XIX. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Atluri, Vijay, ed. Data and Applications Security XXII. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70567-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Barker, Steve, and Gail-Joon Ahn, eds. Data and Applications Security XXI. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73538-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Garfinkel, Simson. RFID: Applications, security, and privacy. Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Recx. Hands-on oracle application express security: Building secure apex applications. Wiley, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Vincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. McGraw-Hill, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Smart cards, tokens, security and applications. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

P, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Stallings, William. Network security essentials: Applications and standards. 4th ed. Prentice Hall, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Krzysztof, Iniewski, ed. Smart grid: Applications, communications, and security. Wiley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

William, Stallings. Network security essentials: Applications and standards. 4th ed. Pearson Prentice Hall, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

William, Stallings. Network security essentials: Applications and standards. 3rd ed. Pearson Education, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wyld, David C., Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, and Dhinaharan Nagamalai, eds. Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Shankar Sriram, V. S., V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, and Gang Li, eds. Applications and Techniques in Information Security. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0871-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sencar, Husrev Taha, Sergio Velastin, Nikolaos Nikolaidis, and Shiguo Lian, eds. Intelligent Multimedia Analysis for Security Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11756-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Byrnes, Jim, and Gerald Ostheimer, eds. Advances in Sensing with Security Applications. Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/1-4020-4295-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Golovin, Alexander A., and Alexander A. Nepomnyashchy, eds. Advances in Sensing with Security Applications. Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/1-4020-4355-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mayes, Keith, and Konstantinos Markantonakis, eds. Smart Cards, Tokens, Security and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Nikolelis, Dimitrios P., and Georgia-Paraskevi Nikoleli, eds. Biosensors for Security and Bioterrorism Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28926-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Degano, Pierpaolo, and Luca Viganò, eds. Foundations and Applications of Security Analysis. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03459-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!