Books on the topic 'Security systems Mathematics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security systems Mathematics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textSecurity engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textSecurity engineering: A guide to building dependable distributed systems. New York: Wiley, 2001.
Find full text1955-, Kachyns'kyi A. B., ed. Systemno-kont︠s︡eptualʹni zasady stratehiï nat︠s︡ionalʹnoï bezpeky Ukraïny. Kyïv: I︠E︡vroatlantykinform, 2007.
Find full textInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Find full textInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Find full text1972-, Ito Takayuki, ed. Rational, robust, and secure negotiations in multi-agent systems. Berlin: Springer, 2008.
Find full textPaolo, Gastaldo, Zunino Rodolfo, Corchado Emilio, and SpringerLink (Online service), eds. Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textPierre, Plamondon, International Labour Office, and International Social Security Association, eds. Actuarial practice in social security. Geneva: International Labour Office, 2002.
Find full textAhson, Syed. Location-based services handbook: Applications, technologies, and security. Boca Raton, FL: CRC Press, 2011.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2007.
Find full textHanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textDamgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Berlin: Springer-Verlag Berlin Heidelberg, 1999.
Find full textYehuda, Lindell, ed. Introduction to modern cryptography: Principles and protocols. Boca Raton: CRC PRESS, 2007.
Find full textKatz, Jonathan. Introduction to modern cryptography. Boca Raton: Chapman & Hall/CRC, 2008.
Find full text1965-, Chan Wai Lok, ed. Intelligent building systems. Boston: Kluwer Academic, 1999.
Find full textHardy, Darel W. Applied algebra: Codes, ciphers, and discrete algorithms. 2nd ed. Boca Raton: Chapman & Hall/CRC, 2009.
Find full text1935-, Walker Carol L., ed. Applied algebra: Codes, ciphers, and discrete algorithms. Upper Saddle River, N.J: Prentice Hall, 2003.
Find full textWang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textGrossklags, Jens. Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. New York: M. Dekker, 2000.
Find full textS, DeSilva Christopher J., ed. Fundamentals of information theory and coding design. Boca Raton, FL: Chapman & Hall/CRC, 2002.
Find full textW, Bradley A. L., ed. Handbook of checked baggage screening: Advanced airport security operation. London: Professional Engineering, 2004.
Find full textservice), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textAvoine, Gildas, and Julio Hernandez-Castro. Security of Ubiquitous Computing Systems. Springer, 2021.
Find full textGuide to Operating Systems and Security. Cengage Learning, 2019.
Find full textFurnell, Steven, Ali Ismail Awad, Marcin Paprzycki, and Sudhir Kumar Sharma. Security in Cyber-Physical Systems: Foundations and Applications. Springer International Publishing AG, 2022.
Find full textFurnell, Steven, Ali Ismail Awad, Marcin Paprzycki, and Sudhir Kumar Sharma. Security in Cyber-Physical Systems: Foundations and Applications. Springer, 2021.
Find full textZabicki, Roman. Practical Security: Simple Practices for Defending Your Systems. Pragmatic Programmers, LLC, The, 2019.
Find full textSecurity and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science). IOS Press, 2006.
Find full textHerrero, A´lvaro, Carlos Cambra, Emilio Corchado, Javier Sedano, and Daniel Urda. 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Springer International Publishing AG, 2020.
Find full textStevenson, James. Android Software Internals Quick Reference: A Field Manual and Security Reference Guide to Java-Based Android Systems. Apress L. P., 2021.
Find full textJaswal, Nipun. Mastering Metasploit: Exploit Systems, Cover Your Tracks, and Bypass Security Controls with the Metasploit 5. 0 Framework, 4th Edition. Packt Publishing, Limited, 2020.
Find full textIntelligent Multimedia Analysis for Security Applications Studies in Computational Intelligence. Springer, 2010.
Find full textWu, Kaishun, Lu Wang, and Yanjiao Chen. Edge Computing and IoT : Systems, Management and Security: Second EAI International Conference, ICECI 2021, Virtual Event, December 22 - 23, 2021, Proceedings. Springer International Publishing AG, 2022.
Find full textDiscrete Dynamical Systems Chaotic Machines: Theory and Applications. Taylor & Francis Group, 2013.
Find full textSecurity Engineering: A Guide to Building Dependable Distributed Systems. Indianapolis: Wiley Publishing, 2008.
Find full textSecurity Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Limited, John, 2021.
Find full textAnderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2020.
Find full textAnderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2020.
Find full textAnderson, Ross, and Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.
Find full textAnderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2008.
Find full textAnderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Limited, John, 2020.
Find full textManaging Risk in Information Systems. Jones & Bartlett Learning, LLC, 2020.
Find full textIntelligence And Security Informatics Techniques And Applications. Springer, 2008.
Find full textZhang, Minjie, Takayuki Ito, Hiromitsu Hattori, and Tokuro Matsuo. Rational, Robust, and Secure Negotiations in Multi-Agent Systems. Springer, 2008.
Find full textZhang, Minjie, Takayuki Ito, Hiromitsu Hattori, and Tokuro Matsuo. Rational, Robust, and Secure Negotiations in Multi-Agent Systems. Springer, 2010.
Find full textLynn, Theo. Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability. Springer Nature, 2021.
Find full textWerff, Lisa Van Der, John Mooney, Grace Fox, and Theo Lynn. Data Privacy and Trust in Cloud Computing: Building Trust in the Cloud Through Assurance and Accountability. Springer International Publishing AG, 2020.
Find full text