Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Modelling cyber security :
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Modelling cyber security : approaches, methodology, strategies / edited by Umberto Gori.
Saved in:
Bibliographic Details
Corporate Authors:
NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow Venice, Italy
,
IOS Press
Other Authors:
Gori, Umberto
Format:
eBook
Language:
English
Published:
Amsterdam ; Washington, D.C. :
Ios Press,
©2009.
Series:
NATO science for peace and security series. Human and societal dynamics ;
v. 59.
Subjects:
Computer security
>
Congresses.
Cryptography
>
Congresses.
Data encryption (Computer science)
>
Congresses.
COMPUTERS
>
Reference.
COMPUTERS
>
Machine Theory.
COMPUTERS
>
Computer Literacy.
COMPUTERS
>
Information Technology.
COMPUTERS
>
Data Processing.
COMPUTERS
>
Computer Science.
COMPUTERS
>
Hardware
>
General.
Computer security
Cryptography
Data encryption (Computer science)
Conference papers and proceedings
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Login for hold information
Click for online access
Online
Holdings details from Online
Available
Similar Items
Cryptography : protocols, design, and applications
Published: (2012)
Applied cryptography and network security : 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, proceedings
Published: (2022)
Secure multi-party computation
Published: (2013)
Hashing in computer science : fifty years of slicing and dicing
by: Konheim, Alan G., 1934-
Published: (2010)
Group theoretic cryptography
by: González Vasco, Maria Isabel, et al.
Published: (2015)