Books on the topic 'Security of information and communication systems'

To see the other types of publications on this topic, follow the link: Security of information and communication systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security of information and communication systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Introduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

P, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

service), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fried, Stephen. Mobile device security: A comprehensive guide to securing your information in a moving world. Boca Raton, FL: Auerbach Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Anjali, Sardana, ed. Honeypot: A new paradigm to information security. Enfield, N.H: Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Nardelli, Enrico. Certification and Security in E-Services: From E-Government to E-Business. Boston, MA: Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Preneel, Bart. Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20-21, 1999, Leuven, Belgium. Boston, MA: Springer US, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Willett, Keith D. Information assurance architecture. Boca Raton: CRC Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Willett, Keith D. Information assurance architecture. Boca Raton: Auerbach, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jeff, Brummond, ed. Transportation infrastructure security utilizing intelligent transportation systems. Hoboken, N.J: John Wiley & Sons, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Schneier, Bruce. Economics of Information Security and Privacy III. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

service), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

United States. President (1993-2001 : Clinton). Information Technology Systems and Security Transfer Account: Communication from the President of the United States transmitting a request for transfers from the Information Technology Systems and Security Transfer Account. Washington: U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Clinton), United States President (1993-2001 :. Information Technology Systems and Security Transfer Account: Communication from the President of the United States transmitting a request for transfers from the Information Technology Systems and Security Transfer Account. Washington: U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Elisa, Bertino, ed. Computer security, ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings. Berlin: Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lei, Jingsheng. Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Robert, Deng, ed. Information and communications security: 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings. New York: Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Fred, Piper, Wang Haining, Kesidis George, and SpringerLink (Online service), eds. Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Károly, Farkas, Schmidt Andreas U, Lioy Antonio 1958-, Russello Giovanni, Luccio Flaminia L, and SpringerLink (Online service), eds. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

International Conference on Information and Communications Security (10th 2008 Birmingham, England). Information and communications security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 ; proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Liqun, Chen, Ryan Mark 1962-, and Wang Guilin Dr, eds. Information and communications security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 ; proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Goos, Gerhard. Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20-21, 2000 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Police information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

International Conference on Information and Communications Security (8th 2006 Raleigh, N.C.). Information and communications security: 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings. Berlin: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Gaïti, Dominique. Network Control and Engineering for QoS, Security and Mobility: IFIP TC6. Boston, MA: Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Office, General Accounting. Information security: Challenges to improving DOD's incident response capabilities : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): U.S. General Accounting Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Office, General Accounting. Defense information superiority: Progress made, but significant challenges remain : report to the Chairman, Subcommittee on Military Research and Development, Committee on National Security, House of Representives. Washington, D.C: The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Poisel, Richard. Tong xin dian zi zhan xi tong dao lun: Introduction to communication electronic warfare systems. Beijing: Dian zi gong ye chu ban she, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lefteris, Mamatas, Matta Ibrahim, Tsaoussidis Vassilis, and SpringerLink (Online service), eds. Wired/Wireless Internet Communication: 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Keromytis, Angelos D. Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Wiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Erlangen: Publicis Corporate Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Voeller, John G. Communications and Information Infrastructure Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Voeller, John G. Communications and Information Infrastructure Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Information systems architecture and technology: Information systems and computer communication networks. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Communication Technologies, Information Security and Sustainable Development. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

(Editor), Robert Deng, Sihan Qing (Editor), Feng Bao (Editor), and Jianying Zhou (Editor), eds. Information and Communications Security. Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mitchell, Chris J., Sihan Qing, and Guilin Wang. Information and Communications Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Software Systems Reliability and Security - Volume 9 NATO Security through Science Series: Information and Communication Security (Nato Security Through ... D: Information and Communication Security). IOS Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wall, David S. Crime, Security, and Information Communication Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.65.

Full text
Abstract:
Networked digital technologies have transformed crime to a point that ‘cybercrime’ is here to stay. In the future, society will be forced to respond to a broad variety of networked crimes that will increase both the complexity of crime investigation and prevention, whilst also deepening the regulative challenges. As cybercrime has become an inescapable feature of the Internet landscape, constructive management and system development to mitigate cybercrime threats and harms are imperatives. This chapter explores the changing cybersecurity threat landscape and its implications for regulation and policing. It considers how networked and digital technologies have affected society and crime; it identifies how the cybersecurity threat and crime landscape have changed and considers how digital technologies affect our ability to regulate them. It also suggests how we might understand cybercrime before outlining both the technological developments that will drive future cybercrime and also the consequences of failing to respond to those changes.
APA, Harvard, Vancouver, ISO, and other styles
50

J, Eberspächer, ed. Sichere Daten, sichere Kommunikation: Datenschutz und Datensicherheit in Telekommunikations- und Informationssystemen = Secure information, secure communication : privacy and information security in communication and information systems. Berlin: Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography