Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007
| Main Authors: | Dawson, Ed (Edward) (Author), Ghodosi, Hossein (Author), Pieprzyk, Josef 1949- (Author) |
|---|---|
| Corporate Author: | ACISP 2007 (2007 : Townsville, Qld.) |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4586 |
| Subjects: |
Similar Items
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Computational intelligence for privacy and security
by: Elizondo, David A., et al.
Published: (2012)
by: Elizondo, David A., et al.
Published: (2012)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information security : principles and practice
by: Stamp, Mark
Published: (2011)
by: Stamp, Mark
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Information security foundations, technology and applications
by: Ali Ismail Awad
Published: (2018)
by: Ali Ismail Awad
Published: (2018)
Microsoft Windows security inside out
by: Bott, Ed, et al.
Published: (2003)
by: Bott, Ed, et al.
Published: (2003)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2003)
by: Whitman, Michael E., et al.
Published: (2003)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security management handbook Volume 4
Principles of information security
by: Whitman, Michael E., et al.
Published: (2005)
by: Whitman, Michael E., et al.
Published: (2005)
Elementary information security
by: Smith, Richard E. 1952-
Published: (2013)
by: Smith, Richard E. 1952-
Published: (2013)
Information security for managers
by: Workman, Michael D. 1957-, et al.
Published: (2013)
by: Workman, Michael D. 1957-, et al.
Published: (2013)
Privacy, intrusion detection, and response : technologies for protecting networks
by: Kabiri, Peyman , 1968-
Published: (2012)
by: Kabiri, Peyman , 1968-
Published: (2012)
Introduction to privacy-preserving data publishing : concepts and techniques
by: Fung, Benjamin C. M.
Published: (2011)
by: Fung, Benjamin C. M.
Published: (2011)
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Management of information security
by: Whitman, Michael E., et al.
Published: (2019)
by: Whitman, Michael E., et al.
Published: (2019)
Information security contemporary cases
by: Wright, Marie A., et al.
Published: (2007)
by: Wright, Marie A., et al.
Published: (2007)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2007)
by: Dhillon, Gurpreet 1963-
Published: (2007)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Privacy-aware knowledge discovery novel applications and new techniques
by: Bonchi, Francesco, et al.
Published: (2011)
by: Bonchi, Francesco, et al.
Published: (2011)
Security studies a reader
by: Hughes, Christopher W., et al.
Published: (2011)
by: Hughes, Christopher W., et al.
Published: (2011)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Privacy and data protection : a comparative analysis with special reference to the Malaysian proposed law
by: Abu Bakar Munir, et al.
Published: (2002)
by: Abu Bakar Munir, et al.
Published: (2002)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Similar Items
-
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007) -
Computational intelligence for privacy and security
by: Elizondo, David A., et al.
Published: (2012) -
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007) -
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014) -
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)