Books on the topic 'Security systems Mathematics'

To see the other types of publications on this topic, follow the link: Security systems Mathematics.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security systems Mathematics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security engineering: A guide to building dependable distributed systems. New York: Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1955-, Kachyns'kyi A. B., ed. Systemno-kont︠s︡eptualʹni zasady stratehiï nat︠s︡ionalʹnoï bezpeky Ukraïny. Kyïv: I︠E︡vroatlantykinform, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1972-, Ito Takayuki, ed. Rational, robust, and secure negotiations in multi-agent systems. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paolo, Gastaldo, Zunino Rodolfo, Corchado Emilio, and SpringerLink (Online service), eds. Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, Plamondon, International Labour Office, and International Social Security Association, eds. Actuarial practice in social security. Geneva: International Labour Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ahson, Syed. Location-based services handbook: Applications, technologies, and security. Boca Raton, FL: CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

V, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Damgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Berlin: Springer-Verlag Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yehuda, Lindell, ed. Introduction to modern cryptography: Principles and protocols. Boca Raton: CRC PRESS, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Katz, Jonathan. Introduction to modern cryptography. Boca Raton: Chapman & Hall/CRC, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

1965-, Chan Wai Lok, ed. Intelligent building systems. Boston: Kluwer Academic, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hardy, Darel W. Applied algebra: Codes, ciphers, and discrete algorithms. 2nd ed. Boca Raton: Chapman & Hall/CRC, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

1935-, Walker Carol L., ed. Applied algebra: Codes, ciphers, and discrete algorithms. Upper Saddle River, N.J: Prentice Hall, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Grossklags, Jens. Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

R, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. New York: M. Dekker, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

S, DeSilva Christopher J., ed. Fundamentals of information theory and coding design. Boca Raton, FL: Chapman & Hall/CRC, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

W, Bradley A. L., ed. Handbook of checked baggage screening: Advanced airport security operation. London: Professional Engineering, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

service), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Avoine, Gildas, and Julio Hernandez-Castro. Security of Ubiquitous Computing Systems. Springer, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Guide to Operating Systems and Security. Cengage Learning, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Furnell, Steven, Ali Ismail Awad, Marcin Paprzycki, and Sudhir Kumar Sharma. Security in Cyber-Physical Systems: Foundations and Applications. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Furnell, Steven, Ali Ismail Awad, Marcin Paprzycki, and Sudhir Kumar Sharma. Security in Cyber-Physical Systems: Foundations and Applications. Springer, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zabicki, Roman. Practical Security: Simple Practices for Defending Your Systems. Pragmatic Programmers, LLC, The, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science). IOS Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Herrero, A´lvaro, Carlos Cambra, Emilio Corchado, Javier Sedano, and Daniel Urda. 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Stevenson, James. Android Software Internals Quick Reference: A Field Manual and Security Reference Guide to Java-Based Android Systems. Apress L. P., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Jaswal, Nipun. Mastering Metasploit: Exploit Systems, Cover Your Tracks, and Bypass Security Controls with the Metasploit 5. 0 Framework, 4th Edition. Packt Publishing, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Intelligent Multimedia Analysis for Security Applications Studies in Computational Intelligence. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wu, Kaishun, Lu Wang, and Yanjiao Chen. Edge Computing and IoT : Systems, Management and Security: Second EAI International Conference, ICECI 2021, Virtual Event, December 22 - 23, 2021, Proceedings. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Discrete Dynamical Systems Chaotic Machines: Theory and Applications. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Security Engineering: A Guide to Building Dependable Distributed Systems. Indianapolis: Wiley Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Limited, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Anderson, Ross, and Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley & Sons, Limited, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Managing Risk in Information Systems. Jones & Bartlett Learning, LLC, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Intelligence And Security Informatics Techniques And Applications. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Minjie, Takayuki Ito, Hiromitsu Hattori, and Tokuro Matsuo. Rational, Robust, and Secure Negotiations in Multi-Agent Systems. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Minjie, Takayuki Ito, Hiromitsu Hattori, and Tokuro Matsuo. Rational, Robust, and Secure Negotiations in Multi-Agent Systems. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lynn, Theo. Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability. Springer Nature, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Werff, Lisa Van Der, John Mooney, Grace Fox, and Theo Lynn. Data Privacy and Trust in Cloud Computing: Building Trust in the Cloud Through Assurance and Accountability. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography