005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)
1999
1
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)
2000
1
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)
2009
1
005.8 Iti/Isc 2010 : Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings / Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.)
2010
1
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)
2004
1
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)
2005
1
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)
2012
1
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge
2012
1
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]
1997-
1
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan
2008
1
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski
2000
1
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich
1998
1
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich
2003
1
005.8 Kra/Itn : Introduction to network security / Neal Krawetz
2007
1
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi
2008
1
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon
2007
1
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]
2009
1
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li
2009
1
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]