Books on the topic 'Security of information and communication systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security of information and communication systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.
Full textSchmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.
Full textSchmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.
Full textPrasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.
Full textSchmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.
Full textJerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.
Find full textIntroduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.
Find full textVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Find full textHarkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Find full textservice), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.
Find full textFried, Stephen. Mobile device security: A comprehensive guide to securing your information in a moving world. Boca Raton, FL: Auerbach Publications, 2010.
Find full textAnjali, Sardana, ed. Honeypot: A new paradigm to information security. Enfield, N.H: Science Publishers, 2011.
Find full textKou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.
Find full textNardelli, Enrico. Certification and Security in E-Services: From E-Government to E-Business. Boston, MA: Springer US, 2003.
Find full textPreneel, Bart. Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20-21, 1999, Leuven, Belgium. Boston, MA: Springer US, 1999.
Find full textWillett, Keith D. Information assurance architecture. Boca Raton: CRC Press, 2008.
Find full textWillett, Keith D. Information assurance architecture. Boca Raton: Auerbach, 2008.
Find full textJeff, Brummond, ed. Transportation infrastructure security utilizing intelligent transportation systems. Hoboken, N.J: John Wiley & Sons, 2008.
Find full textSchneier, Bruce. Economics of Information Security and Privacy III. New York, NY: Springer New York, 2013.
Find full textservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textUnited States. President (1993-2001 : Clinton). Information Technology Systems and Security Transfer Account: Communication from the President of the United States transmitting a request for transfers from the Information Technology Systems and Security Transfer Account. Washington: U.S. G.P.O., 1999.
Find full textClinton), United States President (1993-2001 :. Information Technology Systems and Security Transfer Account: Communication from the President of the United States transmitting a request for transfers from the Information Technology Systems and Security Transfer Account. Washington: U.S. G.P.O., 1999.
Find full textElisa, Bertino, ed. Computer security, ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings. Berlin: Springer, 1996.
Find full textLei, Jingsheng. Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textRobert, Deng, ed. Information and communications security: 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings. New York: Springer, 2002.
Find full textFred, Piper, Wang Haining, Kesidis George, and SpringerLink (Online service), eds. Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textKároly, Farkas, Schmidt Andreas U, Lioy Antonio 1958-, Russello Giovanni, Luccio Flaminia L, and SpringerLink (Online service), eds. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textInternational Conference on Information and Communications Security (10th 2008 Birmingham, England). Information and communications security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 ; proceedings. Berlin: Springer, 2008.
Find full textLiqun, Chen, Ryan Mark 1962-, and Wang Guilin Dr, eds. Information and communications security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 ; proceedings. Berlin: Springer, 2008.
Find full textGoos, Gerhard. Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20-21, 2000 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2000.
Find full textPolice information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.
Find full textInternational Conference on Information and Communications Security (8th 2006 Raleigh, N.C.). Information and communications security: 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings. Berlin: Springer, 2006.
Find full textLukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.
Find full textGaïti, Dominique. Network Control and Engineering for QoS, Security and Mobility: IFIP TC6. Boston, MA: Springer US, 2003.
Find full textOffice, General Accounting. Information security: Challenges to improving DOD's incident response capabilities : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): U.S. General Accounting Office, 2001.
Find full textOffice, General Accounting. Defense information superiority: Progress made, but significant challenges remain : report to the Chairman, Subcommittee on Military Research and Development, Committee on National Security, House of Representives. Washington, D.C: The Office, 1998.
Find full textPoisel, Richard. Tong xin dian zi zhan xi tong dao lun: Introduction to communication electronic warfare systems. Beijing: Dian zi gong ye chu ban she, 2003.
Find full textLefteris, Mamatas, Matta Ibrahim, Tsaoussidis Vassilis, and SpringerLink (Online service), eds. Wired/Wireless Internet Communication: 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textKeromytis, Angelos D. Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textWiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Erlangen: Publicis Corporate Pub., 2004.
Find full textVoeller, John G. Communications and Information Infrastructure Security. Wiley & Sons, Incorporated, John, 2014.
Find full textVoeller, John G. Communications and Information Infrastructure Security. Wiley & Sons, Incorporated, John, 2014.
Find full textInformation systems architecture and technology: Information systems and computer communication networks. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.
Find full textCommunication Technologies, Information Security and Sustainable Development. Springer, 2014.
Find full text(Editor), Robert Deng, Sihan Qing (Editor), Feng Bao (Editor), and Jianying Zhou (Editor), eds. Information and Communications Security. Springer, 2002.
Find full textMitchell, Chris J., Sihan Qing, and Guilin Wang. Information and Communications Security. Springer, 2010.
Find full textSoftware Systems Reliability and Security - Volume 9 NATO Security through Science Series: Information and Communication Security (Nato Security Through ... D: Information and Communication Security). IOS Press, 2007.
Find full textWall, David S. Crime, Security, and Information Communication Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.65.
Full textJ, Eberspächer, ed. Sichere Daten, sichere Kommunikation: Datenschutz und Datensicherheit in Telekommunikations- und Informationssystemen = Secure information, secure communication : privacy and information security in communication and information systems. Berlin: Springer-Verlag, 1994.
Find full text