Books in Shelfclass 3.N, Cryptography & Data Security:

Number of books: 708

Shelfclass Sortkey Title
3.N ACISP ACISP 1996: Information Security and Privacy: 1st Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996: proceedings
3.N ACISP ACISP 1997: Information Security and Privacy: 2nd Australasian Conference, ACISP '97, Sydney, NSW, Australia, June 7-9, 1997: proceedings
3.N ACISP ACISP 1998: Information Security and Privacy: 3rd Australasian Conference, ACISP '98, Brisbane, Australia, July 13-15, 1998: proceedings
3.N ACISP ACISP 1999: Information Security and Privacy: 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999: proceedings
3.N ACISP ACISP 2000: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000: proceedings
3.N ACISP ACISP 2001: Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001: proceedings
3.N ACISP ACISP 2002: Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002: proceedings
3.N ACISP ACISP 2003: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003: proceedings
3.N ACISP ACISP 2004: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004: proceedings
3.N ACISP ACISP 2005: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005: proceedings
3.N ACISP ACISP 2006: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006: proceedings
3.N ACISP ACISP 2007: Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007: proceedings
3.N ACISP ACISP 2008: Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
3.N ACISP Information Security and Privacy, 16th Australasian Conferences, ACISP 2011
3.N ACISP Information Security and Privacy, 18th Australasian Conferences, ACISP 2013
3.N ACNS ACNS 2003: Applied Cryptography and Network Security: 1st International Conference, ACNS 2003, Kunming, China, October 16-19, 2003: proceedings
3.N ACNS ACNS 2004: Applied Cryptography and Network Security: 2nd International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004: proceedings
3.N ACNS ACNS 2005: Applied Cryptography and Network Security: 3rd International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005: proceedings
3.N ACNS ACNS 2006: Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006: proceedings
3.N ACNS ACNS 2007: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings
3.N ACNS ACNS 2008: Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008., Proceedings
3.N ACNS Applied Cryptography and Network Security, 9th International Conference, ACNS 2011
3.N ADAMS, CARLISLE Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
3.N ADAMS, RUSSELL E Sourcebook of Automatic Identification and Data Collection
3.N AGRAWAL, MANISH Information Security and IT Risk Management
3.N AHONEN, PASI TITAN-käsikirja: VTT:n päätuloksia Tekesin Turvallisuusohjelman TITAN-projektissa
3.N AIMANI, LAILA EL Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms
3.N ALBRECHT, W. STEVE Fraud Examination
3.N ALDINI, ALESSANDRO Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures
3.N AMOROSO, EDWARD Fundamentals of Computer Security Technology
3.N AMOROSO, EDWARD Intranet and Internet Firewall Strategies
3.N AMOROSO, EDWARD Intrusion Detection
3.N ANAND, SANJAY Sarbanes-Oxley Guide for Finance and Information Technology Professionals
3.N ANDREASSEN, KARL Computer Cryptology: Beyond Decoder Rings
3.N ANDRESS, JASON Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
3.N ANDREWS, CHIP SQL Server Security
3.N ANTS ANTS I: Algorithmic Number Theory: 1st International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994: proceedings
3.N ANTS ANTS II: Algorithmic Number Theory: 2nd International Symposium, ANTS-II, Talence, France, May 18-23, 1996: proceedings
3.N ANTS ANTS III: Algorithmic Number Theory: 3rd International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998: proceedings
3.N ANTS ANTS IV: Algorithmic Number Theory: 4th International Symposium, ANTS-IV, Leiden, the Netherlands, July 2-7, 2000: proceedings
3.N ANTS ANTS V: Algebraic Number Theory: 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002: proceedings
3.N ANTS ANTS VI: Algorithmic Number Theory: 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004: proceedings
3.N ANTS ANTS VII: Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006: proceedings
3.N ANTS ANTS VIII: Algorithmic Number Theory: 8th International Symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008: Proceedings
3.N APPLIED Applied Cryptology, Cryptographic Protocols, and Computer Security Models: Lecture Notes Prepared for the American Mathematical Society Short Course, Cryptology in Revolution: Mathematics and Models, held in San Francisco, California, January 5-6, 1981
3.N ARQUILLA, JOHN The Advent of Netwar
3.N ASIACRYPT Advances in Cryptology - ASIACRYPT 2009
3.N ASIACRYPT Advances in Cryptology - ASIACRYPT 2018, part 3
3.N ASIACRYPT ASIACRYPT 1991: Advances in Cryptology - ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings
3.N ASIACRYPT ASIACRYPT 1994: Advances in Cryptology - ASIACRYPT '94: 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings
3.N ASIACRYPT ASIACRYPT 1996: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings
3.N ASIACRYPT ASIACRYPT 1998: Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings
3.N ASIACRYPT ASIACRYPT 1999: Advances in Cryptology - ASIACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings
3.N ASIACRYPT ASIACRYPT 2000: Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings
3.N ASIACRYPT ASIACRYPT 2001: Advances in Cryptology - ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings
3.N ASIACRYPT ASIACRYPT 2002: Advances in Cryptology - ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings
3.N ASIACRYPT ASIACRYPT 2003: Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings
3.N ASIACRYPT ASIACRYPT 2004: Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
3.N ASIACRYPT ASIACRYPT 2005: Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
3.N ASIACRYPT ASIACRYPT 2006: Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
3.N AUSCRYPT AUSCRYPT 1990: Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings
3.N AUSCRYPT AUSCRYPT 1992: Advances in Cryptology - AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings
3.N AUSTIN, TOM PKI: A Wiley Tech Brief
3.N BACH, ERIC Algorithmic Number Theory: Volume I: Efficient Algorithms
3.N BAKER, RICHARD H Computer Security Handbook
3.N BARRETT, DANIEL J. SSH, the Secure Shell: The Definitive Guide
3.N BAUER, FRIEDRICH LUDWIG Decrypted Secrets: Methods and Maxims of Cryptology
3.N BEJTLICH, RICHARD The Practice of Network Security Monitoring
3.N BEKER, HENRY Cryptography and Coding
3.N BELL, D. E. Secure Computer System: Unified Exposition and Multics Interpretation
3.N BELLOVIN, STEVEN M. Thinking Security: Stopping Next Year’s Hackers
3.N BENANTAR, MESSAOUD Access Control Systems: Security, Identity Management and Trust Models
3.N BERNSTEIN, DANIEL J. Post-Quantum Cryptography
3.N BERTINO, ELISA Identity Management: Concepts, Technologies, and Systems
3.N BEUTELSPACHER, ALBRECHT Cryptology: An Introduction to the Art and Science of Enciphering, Encrypting, Concealing, Hiding and Safeguarding Described without any Arcane Skullduggery but not ithout Cunning Waggery for the Delectation and instruction of the general public
3.N BHARGAV, ABHAY PCI Compliance: The Definitive Guide
3.N BHASKAR, KRISH Computer Security: Threats and Countermeasures
3.N BIBA Integrity Considerations for Secure Computer Systems
3.N BIHAM, ELI Differential Cryptanalysis of the Data Encryption Standard
3.N BINNIE, CHRIST Linux Server Security
3.N BIOSURVEILLANCE BIOSURVEILLANCE 2007: Intelligence and Security Informatics: Biosurveillance
3.N BIRCH, DAVID Digital Identity Management: Perspectives on the Technological, Business and Social Implications
3.N BIRMAN, KENNETH P Building Secure and Reliable Network Applications
3.N BLACK, UYLESS Internet Security Protocols: Protecting IP Traffic
3.N BLUNDEN, BILL Behold a Pale Farce: Cyberwar, Threat Inflation & the Malware Industrial Complex
3.N BLUNDEN, BILL The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
3.N BOLLINGER, JEFF Crafting the Infosec Playbook
3.N BOSSELAERS, ANTOON Integrity Primitives for Secure Information Systems: Final Report of RACE Integrity Primitives Evaluation, RIPE-RACE 1040
3.N BOYD, COLIN Protocols for Authentication and Key Establishment
3.N BRADLEY, TONY PCI Compliance: Implementing Effective PCI Data Security Standards
3.N BRAND, KEVIN NTRU Cryptography: A Lattice-Based Cryptosystem and Attacks against it
3.N BRANTLY, AARON FRANKLIN The Decision to Attack: Military and Intelligence Cyber Decision-Making
3.N BRASSARD, GILLES Modern Cryptology: A Tutorial
3.N BROWN, KEITH Programming Windows Security
3.N BUCHMANN, JOHANNES A Introduction to Public Key Infrastructures: [Elektronisk resurs] /
3.N BUNKER, GUY Data Leaks for Dummies
3.N CALC CaLC 2001: Cryptography and Lattices: International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers
3.N CAMPEN, ALAN D. Cyberwar: Security, Strategy, and Conflict in the Information Age
3.N CANS CANS 2006: Cryptology and Network Security: 5th International Conference, CANS 2006 Suzhou, China, December 2006: proceedings
3.N CANS CANS 2007: Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. proceedings
3.N CARASIK, ANNE Unix Secure Shell
3.N CARDIS CARDIS 1998: Smart Card Research and Applications: Third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings
3.N CARDIS CARDIS 2008: Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings
3.N CARR, JEFFREY Inside Cyber Warfare
3.N CAVOUKIAN, ANN Who Knows: Safeguarding Your Privacy in a Networked World
3.N CCS CCS 2001: 8th ACM Conference on Computer and Communications Security: Proceedings. Philadelphia, Pennsylvania, USA, November 5-8, 2001
3.N CCS CCS 2003: 10th ACM Conference on Computer and Communications Security: Proceedings. Washington, DC, USA, October 27-31, 2003
3.N CCS CCS 2004: 11th ACM Conference on Computer and Communications Security: Proceedings. Washington, DC, USA, October 25-29, 2004
3.N CCS CCS 2005: 12th ACM Conference on Computer and Communications Security: Proceedings. Alexandria, Virginia, USA, November 7-11, 2005
3.N CCS CCS 2006: 13th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 30-November 3, 2006
3.N CCS CCS 2007: 14th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 29 - November 2, 2007
3.N CCS CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 27-31, 2008
3.N CCS CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security: November 9-13, 2009, Chicago, Illinois, USA
3.N CCS CCS 2010: Proceedings of the 17th ACM Conference on Computer and Communications Security: October 4-8, 2010, Chicago, Illinois, USA
3.N CERRI, CHRISTIAN AWS Scripted 2: Essential Security, SSH and MFA
3.N CHAKRABARTI, ANIRBAN Grid Computing Security
3.N CHAPMAN, D. BRENT Building Internet Firewalls
3.N CHENG, LEBIN Cloud Security for Dummies: Netskope Special Edition
3.N CHEN, ZHIQUN Java Card Technology for Smart Cards: Architecture and Programmer's Guide
3.N CHES CHES 1999: Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings
3.N CHES CHES 2000: Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings
3.N CHES CHES 2001: Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001, Proceedings
3.N CHES CHES 2007: Cryptographic Hardware and Embedded Systems: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
3.N CHOR, BEN-ZION Two Issues in Public Key Cryptography: RSA bit security and a new knapsack type system
3.N CLARK, DAVID LEON IT Manager's Guide to Virtual Private Networks
3.N CLARKE, RICHARD A. Cyber War: The Next Threat to National Security and What to Do About It
3.N CLOUTIER, ROLAND P. Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders
3.N COBIT COBIT Control Practices: [Elektronisk resurs]: Guidance to Achieve Control Objectives for Successful IT Governance
3.N COHEN, FREDERICK B. A Short Course on Computer Viruses
3.N COJOCARU, ALINA An Introduction to Sieve Methods and Their Applications
3.N COLLINS, MICHAEL Network Security Through Data Analysis: Building Situational Awareness
3.N CONVERY, SEAN Network Security Architectures
3.N COOK, DEBRA CryptoGraphics: Exploiting Graphics Cards for Security
3.N CORNDORF, ERIC Quantum Cryptography Using Coherent States: Randomized Encryption and Key Generation
3.N COSTA, SUELI I. R. Lattices Applied to Coding for Reliable and Secure Communications
3.N COX, INGEMAR J. Digital Watermarking
3.N COX, PHILIP Windows 2000 Security Handbook
3.N COYNE, EDWARD J. Role Engineering for Enterprise Security Management
3.N CQRE CQRE 1999: Secure Networking - CQRE [Secure] '99: International Exhibition and Congress, Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings
3.N CRACKING Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
3.N CRUME, JEFF Inside Internet Security: What Hackers Don't Want You To Know
3.N CRYPTO Advances in Cryptology - CRYPTO 2009
3.N CRYPTO Advances in Cryptology - CRYPTO 2011
3.N CRYPTO Advances in Cryptology - CRYPTO 2013, Part 1
3.N CRYPTO CRYPTO 1981-1997: Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997
3.N CRYPTO CRYPTO 1983: Advances in Cryptology: Proceedings of CRYPTO 83
3.N CRYPTO CRYPTO 1984: Advances in Cryptology: Proceedings of CRYPTO 84
3.N CRYPTO CRYPTO 1985: Advances in Cryptology - CRYPTO '85: Proceedings
3.N CRYPTO CRYPTO 1986: Advances in Cryptology - CRYPTO '86: Proceedings
3.N CRYPTO CRYPTO 1987: Advances in Cryptology - CRYPTO '87: Proceedings
3.N CRYPTO CRYPTO 1988: Advances in Cryptology - CRYPTO '88: Proceedings
3.N CRYPTO CRYPTO 1989: Advances in Cryptology - CRYPTO '89: Proceedings
3.N CRYPTO CRYPTO 1990: Advances in Cryptology - CRYPTO '90: Proceedings
3.N CRYPTO CRYPTO 1991: Advances in Cryptology - CRYPTO '91: Proceedings
3.N CRYPTO CRYPTO 1992: Advances in Cryptology - CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings
3.N CRYPTO CRYPTO 1993: Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings
3.N CRYPTO CRYPTO 1994: Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings
3.N CRYPTO CRYPTO 1995: Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings
3.N CRYPTO CRYPTO 1996: Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings
3.N CRYPTO CRYPTO 1997: Advances in Cryptology - CRYPTO '97: 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings
3.N CRYPTO CRYPTO 1998: Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings
3.N CRYPTO CRYPTO 1999: Advances in Cryptology - CRYPTO '99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings
3.N CRYPTO CRYPTO 2000: Advances in Cryptology - CRYPTO 2000: 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings
3.N CRYPTO CRYPTO 2001: Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings
3.N CRYPTO CRYPTO 2002: Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings
3.N CRYPTO CRYPTO 2003: Advances in Cryptology - CRYPTO 2001: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings
3.N CRYPTO CRYPTO 2004: Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
3.N CRYPTO CRYPTO 2005: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings
3.N CRYPTO CRYPTO 2006: Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings
3.N CRYPTOGRAPHY Cryptography 1982: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982
3.N CRYPTOGRAPHY Cryptography 1995: Cryptography: Policy and Algorithms: International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings
3.N CRYPTOGRAPHY Cryptography and Liberty: An International Survey of Encryption Policy
3.N CSAW CSAW '07: Computer Security Architecture Workshop: Proceedings. Faifax, Virginia, USA, November 2, 2007.
3.N CSPS Computer Security and Privacy Symposium: Proceedings, April 18-19, 1978, The Inn, McCormick Ranch, Scottsdale, Arizona
3.N CT-RSA CT-RSA 2001: Topics in Cryptology - CT-RSA 2001: The Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings
3.N DAEMEN, JOAN The Design of Rijndael: AES - the Advanced Encryption Standard
3.N DAMGÅRD, IVAN Lectures on Data Security: Modern Cryptology in Theory and Practice
3.N DAVIS, CARLTON R. IPSec: Securing VPNs
3.N DELFS, HANS Introduction to Cryptography: Principles and Applications
3.N DELUCCIA, JAMES J. IV IT Compliance and Controls: Best Practices for Implementation
3.N DEMILLO, RICHARD A Applied Cryptology, Cryptographic Protocols, and Computer Security Models
3.N DENNING, DOROTHY ELISABETH ROBLING Secure Information Flow in Computer Systems
3.N DENNING, DOROTHY ELIZABETH ROBLING Cryptography and Data Security
3.N DESOKY, ABDELRAHMAN Noiseless Steganography: [Elektronisk resurs] :: The Key to Covert Communications
3.N DHANJANI, NITESH Abusing the Internet of Things
3.N DIGITAL Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA)
3.N DIM DIM '05: Digital Idenitity Management: Proceedings of the 2005 ACM Workshop on Digital Identity Management: November 11, 2005, Fairfax, Virginia, USA: co-located with CCS 2005
3.N DIM 2007 DIM '07: Digital Identity Management: Proceedings of the 2007 ACM Workshop
3.N DING, C The Stability Theory of Stream Ciphers
3.N DIOGENES, YURI Microsoft Azure Security Infrastructure
3.N DORASWAMY, NAGANAND IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
3.N DORASWAMY, NAGANAND IPSec: The New Standard for the Internet, Intranets, and Virtual Private Networks
3.N DOTZAUER, TIMO Das SSH Buch: Leitfaden für den sicheren Einsatz von OpenSSH
3.N DRM DRM 2001: Security and Privacy in Digital Rights Management: ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001: revised papers
3.N DRM DRM 2002: Digital Rights Management: ACM CCS-9 Workshop DRM 2002, Washington, DC, USA, November 18, 2002: revised papers
3.N DRM DRM 2003: Third ACM Workshop on Digital Rights Management: Proceedings of the Third ACM Workshop on Digital Rights Management: Washington, DC, USA
3.N DRM DRM 2004: Fourth ACM Workshop on Digital Rights Management: Proceedings. Washington, DC, USA, October 25, 2004. Co-located with CCS 2004
3.N DRM DRM 2005: Fifth ACM Workshop on Digital Rights Management: November 7, 2005, Alexandria, Virginia, USA
3.N DRM DRM 2007: Digital Rights Management: Alexandria, Virginia, USA, October 29, 2007, Proceedings
3.N DULANEY, EMMETT CompTIA Security+, Study Guide
3.N DUNSMORE, BRADLEY Mission Critical! Internet Security
3.N DWIVEDI, HIMANSHU Implementing SSH: Strategies for Optimizing the Secure Shell
3.N DWIVEDI, HIMANSHU Implementing SSH: Strategies for Optimizing the Secure Shell
3.N EILAM, ELDAD Reversing: Secrets of Reverse Engineering
3.N EISS EISS 1991: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
3.N ENGER, NORMAN L Computer Security: A Management Audit Approach
3.N ESAS ESAS 2004: Security in Ad-Hoc and Sensor Networks: First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004: revised selected papers
3.N ESAS ESAS 2005: Security and Privacy in Ad-Hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005: revised selected papers
3.N ESCAMILLA, TERRY Intrusion Detection: Network Security Beyond the Firewall
3.N ESORICS ESORICS 1992: Computer Security - ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
3.N ESORICS ESORICS 1994: Computer Security: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994: Proceedings
3.N ESORICS ESORICS 1998: Computer Security - ESORICS 98: 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
3.N ESORICS ESORICS 2000: Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
3.N ESORICS ESORICS 2007: Computer Security: 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007: proceedings
3.N ESORICS ESORICS 2008: Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008, Proceedings
3.N ESORICS 1996 ESORICS 1996: Computer Security - ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996: Proceedings
3.N EU GENERAL EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide
3.N EUROCRYPT Advances in Cryptology - EUROCRYPT 2011
3.N EUROCRYPT Advances in Cryptology - EUROCRYPT 2012
3.N EUROCRYPT EUROCRYPT 1984: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984
3.N EUROCRYPT EUROCRYPT 1985: Advances in Cryptology - EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, Linz, Austria, April 1985
3.N EUROCRYPT EUROCRYPT 1987: Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings
3.N EUROCRYPT EUROCRYPT 1988: Advances in Cryptology - EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings
3.N EUROCRYPT EUROCRYPT 1989: Advances in Cryptology - EUROCRYPT '89: Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings
3.N EUROCRYPT EUROCRYPT 1990: Advances in Cryptology - EUROCRYPT '90: Workshop on the Theory and Application of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings
3.N EUROCRYPT EUROCRYPT 1991: Advances in Cryptology - EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings
3.N EUROCRYPT EUROCRYPT 1992: Advances in Cryptology - EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings
3.N EUROCRYPT EUROCRYPT 1993: Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings
3.N EUROCRYPT EUROCRYPT 1994: Advances in Cryptology - EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings
3.N EUROCRYPT EUROCRYPT 1995: Advances in Cryptology - EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21 - 25, 1995, Proceedings
3.N EUROCRYPT EUROCRYPT 1996: Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceedings
3.N EUROCRYPT EUROCRYPT 1997: Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings
3.N EUROCRYPT EUROCRYPT 1998: Advances in Cryptology - EUROCRYPT '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceedings
3.N EUROCRYPT EUROCRYPT 1999: Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceedings
3.N EUROCRYPT EUROCRYPT 2000: Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceedings
3.N EUROCRYPT EUROCRYPT 2001: Advances in Cryptology - EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceedings
3.N EUROCRYPT EUROCRYPT 2002: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings
3.N EUROCRYPT EUROCRYPT 2003: Advances in Cryptology - EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings
3.N EUROCRYPT EUROCRYPT 2004: Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
3.N EUROCRYPT EUROCRYPT 2005: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
3.N EUROCRYPT EUROCRYPT 2006: Advances in Cryptology - EUROCRYPT 2006: 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings: [electronic resource]
3.N EUROCRYPT EUROCRYPT 2008: Advances in Cryptology - EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings
3.N EUROCRYPT EUROCRYPT 2014: Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
3.N FAST FAST 2006: Formal Aspects in Security and Trust: 4th International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006: revised selected papers
3.N FAST Fast Software Encryption Workshop 1999
3.N FC FC 1997: Financial Cryptography: 1st International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997: proceedings
3.N FC FC 1998: Financial Cryptography: 2nd International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998: proceedings
3.N FC FC 1999: Financial Cryptography: 3rd International Conference, FC '99, Anguilla, British West Indies, February 22-25, 1999: proceedings
3.N FC FC 2000: Financial Cryptography: 4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings
3.N FC FC 2001: Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001: proceedings
3.N FC FC 2002: Financial Cryptography: 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002: revised papers
3.N FC FC 2003: Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003: revised papers
3.N FC FC 2004: Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004: revised papers
3.N FC FC 2005: Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwaelth of Dominica, February 28- March 3, 2005: revised papers
3.N FC FC 2006: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006: revised selected papers
3.N FC FC 2007: Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. revised selected papers
3.N FEDERATED Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions
3.N FEGHHI, JALAL Digital Certificates: Applied Internet Security
3.N FERGUSON, NIELS Cryptography Engineering: Design Principles and Practical Applications
3.N FERRAIOLO, DAVID Role-Based Access Control
3.N FINCH, JAMES H Computer Security: A Global Challenge: Proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984
3.N FISCHER-HÜBNER, SIMONE IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
3.N FISHER, ROYAL P. Information Systems Security
3.N FMSE FMSE '03: Formal Methods in Security Engineering: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering: Washington, DC, USA, October 30, 2003: co-located with CCS'03
3.N FMSE FMSE '05: Formal Methods in Security Engineering: Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering: November 11, 2005, Fairfax, Virginia, USA: co-located with CCS 2005
3.N FMSE FMSE '07: Formal Methods in Security Engineering: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia, USA, November 2, 2007
3.N FORD, WARWICK Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
3.N FORSHAW, JAMES Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation
3.N FOSTER, JAMES C Sockets, Shellcode, Porting & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
3.N FRANKEL, SHEILA Demystifying the IPSec Puzzle
3.N FROLOV, KONSTANTIN Protection of Civilian Infrastructure from Acts of Terrorism
3.N FSE Fast Software Encryption: 15th International Workshop, FSE 2008
3.N FSE Fast Software Encryption: 16th International Workshop, FSE 2009
3.N FSE Fast Software Encryption: 17th International Workshop, FSE 2010
3.N FSE Fast Software Encryption: 18th International Workshop, FSE 2011
3.N FSE Fast Software Encryption: 20th International Workshop, FSE 2013
3.N FSE Fast Software Encryption: 21th International Workshop, FSE 2014
3.N FSE FSE 1993: Fast Software Encryption: 1st International Workshop, Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993: proceedings
3.N FSE FSE 1994: Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994, Proceedings
3.N FSE FSE 1996: Fast Software Encryption: 3rd International Workshop, Cambridge, UK, February 21-23, 1996: proceedings
3.N FSE FSE 1997: Fast Software Encryption: 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997: proceedings
3.N FSE FSE 1998: Fast Software Encryption: 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998: proceedings
3.N FSE FSE 1999: Fast Software Encryption: 6th International Workshop, FSE'99, Rome, Italy, March 24-26, 1999: proceedings
3.N FSE FSE 2000: Fast Software Encryption: 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000: proceedings
3.N FSE FSE 2001: Fast Software Encryption: 8th International Workshop, FSE 2001, Yokohama, Japan, April 2-4, 2001: revised papers
3.N FSE FSE 2002: Fast Software Encryption: 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002: revised papers
3.N FSE FSE 2003: Fast Software Encryption: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003: revised papers
3.N FSE FSE 2004: Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers
3.N FSE FSE 2007: Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers
3.N FSE 2016 Fast Software Encryption: 23rd International Conference, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Proceedings
3.N FUMY, WALTER Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies
3.N FURTEK, FREDERICK C A Validation Technique for Computer Security Based on the Theory of Constraints
3.N GAINES, HELEN FOUCHÉ Cryptanalysis: A Study of Ciphers and Their Solution
3.N GARDNER, BILL Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats
3.N GARFINKEL, SIMSON Practical UNIX and Internet Security
3.N GARFINKEL, SIMSON Web Security and Commerce
3.N GARRETT, PAUL Making, Breaking Codes: An Introduction to Cryptography
3.N GARRETT, PAUL Public-Key Cryptography: American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
3.N GATHEN, JOACHIM VON ZUR CryptoSchool
3.N GHOSH, ANUP K. E-Commerce Security: Weak Links, Best Defences
3.N GILMAN, EVAN Zero Trust Networks: Building Secure Systems in Untrusted Networks
3.N GOLDREICH, ODED Foundations of Cryptography: Volume I: Basic Tools
3.N GOLDREICH, ODED Foundations of Cryptography: Volume II: Basic Applications
3.N GOLDREICH, ODED Modern Cryptography, Probabilistic Proofs and Pseudorandomness
3.N GOLLMANN, DIETER Computer Security
3.N GOLOMB, SOLOMON W Shift Register Sequences
3.N GONCALVES, MARCUS Firewalls Complete
3.N GONCALVES, MARCUS Firewalls Complete
3.N GOODMAN, SEYMOUR Executive Briefing: An Examination of High-Performance Computing Export Control policy in the 1990s
3.N GORDON, ADAM The Official (ISC)² Guide to the CCSPSM CBK
3.N GRANT, GAIL L. Understanding Digital Signatures
3.N GREENFIELD, JONATHAN S Distributed Programming Paradigms with Cryptography Applications
3.N GREER, MELVIN B., JR. Practical Cloud Security: A Cross-Industry View
3.N GUTMANN, PETER Design and Verification of a Cryptographic Security Architecture
3.N HARDY, G An Introduction to the Theory of Numbers
3.N HARRISON, ANNETTE The Problem of Privacy in the Computer Age: An Annotated Bibliography
3.N HARRISON, RICHARD ASP/MTS/ADSI: Web Security
3.N HARRIS, SHON CISSP All-in-one Exam Guide
3.N HECKMAN, KRISTIN E. Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense
3.N HEIDERICH, MARIO Web Application Obfuscation: [Elektronisk resurs] :: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
3.N HELOPURO, SANNA Sähköisen Viestinnän Tietosuoja
3.N HENRY, RYAN The Information Revolution and International Security
3.N HERBIG, CHRISTOPHER FRED Use of OpenSSH Support for Remote Login to a Multilevel Secure System
3.N HOFFMAN, LANCE J Security and Privacy in Computer Systems
3.N HOFFMAN, LANCE J. Building in Big Brother: the Cryptographic Policy Debate
3.N HOFFSTEIN, JEFFREY An Introduction to Mathematical Cryptography
3.N HOGLUND, GREG Rootkits: Subverting the Windows Kernel
3.N HOLTMANNS, SILKE Cellular Authentication for Mobile and Internet Services
3.N HOSEK, SUSAN D. Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System
3.N HOUSLEY, RUSS Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
3.N HOWARD, JOHN D. An Analysis of Security Incidents on the Internet 1989-1995
3.N HOWARD, MICHAEL The Security Development Lifecycle: SDL, a Process for Developing Demonstrably More Secure Software
3.N HRUSKA, JAN Computer Viruses and Anti-Virus Warfare
3.N HUANG, ANDREW Hacking the Xbox: an Introduction to Reverse Engineering
3.N HUDAK, TYLER OpenSSH: A Survival Guide for Secure Shell Handling: Version 1.0
3.N HU, FEI Security and Privacy on Internet of Things (IoTs): Models, Algorithms, and Implementations
3.N HU, WEI DCE Security Programming
3.N ICICS ICICS 1997: Information and Communications Security: First International Conference, ICICS '97, Beijing, China, November 11-14, 1997, Proceedings
3.N ICICS ICICS 1999: Information and Communication Security: Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings
3.N ICICS ICICS 2006: Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006: proceedings
3.N ICICS ICICS 2007: Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. proceedings
3.N ICICS ICICS 2008: Information and Communications Security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20 - 22, 2008, Proceedings
3.N ICISC ICISC 1999: Information Security and Cryptology - ICISC'99: Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings
3.N ICISC ICISC 2000: Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings
3.N ICISC ICISC 2002: Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002: Revised Papers
3.N ICISC ICISC 2006: Information Security and Cryptology - ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings
3.N ICISS ICISS 2006: Information Systems Security: 2nd International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006: proceedings
3.N ICISS ICISS 2007: Information Systems Security: 3rd International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. proceedings
3.N IFIP IFIP 1999: Research Advances in Database and Information Systems Security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA
3.N IFIP IFIP 2007: Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007: proceedings
3.N IFIP IFIP 2008: Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings
3.N IH IH 2005: Information Hiding: 7th International Workshop
3.N IH IH 2008: Information Hiding: 10th International Workshop
3.N IH IH 2010: Information Hiding: 12th International Workshop
3.N IH IH 2011: Information Hiding: 13th International Workshop
3.N IH IH 2012: Information Hiding: 14th International Workshop
3.N IH 1996 IH 1996: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings
3.N IH 1998 IH 1998: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings
3.N IH 1999 IH 1999: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings
3.N IH 2002 IH 2002: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers
3.N IH 2006 IH 2006: Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Selected Papers
3.N IH 2007 IH 2007: Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
3.N IIVARI, MIKA Liiketoiminnan jatkuvuussuunnittelu ja ICT-varautuminen
3.N IMA IMA 1991: Cryptography and Coding III: Based on the Proceedings of a Conference Organized by the Institute of Mathematics and its Applications on Cryptography and Coding, held at the Royal Agricultural College, Cirencester, in December 1991
3.N IMA IMA 1995: Cryptography and Coding: 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings
3.N IMA IMA 1997: Cryptography and Coding: 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings
3.N IMA IMA 1999: Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings
3.N IMA IMA 2007: Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings
3.N INDOCRYPT INDOCRYPT 2000: Progress in Cryptology: 1st International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000: proceedings
3.N INDOCRYPT INDOCRYPT 2001: Progress in Cryptology: 2nd International Conference on Cryptology in India, Chennai, India, December 16-20, 2001: proceedings
3.N INDOCRYPT INDOCRYPT 2002: Progress in Cryptology: 3rd International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002: proceedings
3.N INDOCRYPT INDOCRYPT 2003: Progress in Cryptology: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003: proceedings
3.N INDOCRYPT INDOCRYPT 2004: Progress in Cryptology: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004: proceedings
3.N INDOCRYPT INDOCRYPT 2006: Progress in Cryptology: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006 ; proceedings
3.N INDOCRYPT INDOCRYPT 2007: Progress in Cryptology: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. proceedings
3.N INFOWAR InfoWar
3.N INSCRYPT INSCRYPT 2006: Information Security and Cryptology: 2nd SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings
3.N INSCRYPT Inscrypt 2007: Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
3.N IPSEC IPSEC ISV VeriSign Integration Guide
3.N ISC ISC 2001: Information Security: 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001: Proceedings
3.N ISC ISC 2003: Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003: Proceedings
3.N ISC ISC 2004: Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings
3.N ISC ISC 2005: Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005: Proceedings
3.N ISC ISC 2007: Information Security: 10th International Conference, ISC 2007, Valparaâiso, Chile, October 9-12, 2007: proceedings
3.N ISPEC ISPEC 2005: Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
3.N ISPEC ISPEC 2007: Information Security Practice and Experience: 3rd International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007: proceedings
3.N ISPEC ISPEC 2008: Information Security Practice and Experience: 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings
3.N ISW ISW 1997: Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997, Proceedings
3.N ISW ISW 1999: Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999, Proceedings
3.N ISW ISW 2000: Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000, Proceedings
3.N IWSEC IWSEC 2006: Advances in Information and Computer Security: 1st International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006: proceedings
3.N IWSEC IWSEC 2007: Advances in Information and Computer Security: 2nd International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: proceedings
3.N JAVACARD JavaCard 2000: Java on Smart Cards: Programming and Security: First International Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised Papers
3.N JOHNSON, ROB Security Policies and Implementation Issues
3.N KAPLAN, FRED Dark Territory: The Secret History of Cyber War
3.N KAPLAN, JAMES M. Beyond Cybersecurity: Protecting Your Digital Business
3.N KASPERSKY, KRIS Hacker Disassembling Uncovered
3.N KOBLITZ, NEAL A Course in Number Theory and Cryptography
3.N KOBLITZ, NEAL Algebraic Aspects of Cryptography
3.N KOBLITZ, NEAL Introduction to Elliptic Curves and Modular Forms
3.N KOBLITZ, NEAL Towards a Quarter-Century of Public key Cryptography
3.N KONHEIM, ALAN G Cryptography: a Primer
3.N KOSIUR, DAVE Building and Managing Virtual Private Networks
3.N KOZIOL, JACK The Shellcoder's Handbook: Discovering and Exploiting Security Holes
3.N KRANAKIS, EVANGELOS Selected Areas in Cryptography
3.N KRUTZ, RONALD L. Cloud Security: A Comprehensive Guide to Secure Cloud Computing
3.N KULLBACK, SOLOMON Statistical Methods in Cryptanalysis
3.N LAHTI, CHRISTIAN B. Sarbanes-Oxley: IT Compliance Using COBIT and Open Source Tools
3.N LAI, XUEJIA On the Design and Security of Block Ciphers
3.N LANDOLL, DOUGLAS J. The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
3.N LANG, SERGE Elliptic Functions
3.N LANSEC LANSEC 1989: Local Area Network Security: Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989, Proceedings
3.N LAURENT, MARYLINE Digital Identity Management
3.N LIU, DALE Next Generation SSH2 Implementation: Securing Data in Motion
3.N LOBEL, JEROME Foiling the System Breakers: Computer Security and Access Control
3.N LOCATI, FABIO ALESSANDRO OpenStack Cloud Security: Build a secure OpenStack cloud to withstand all common attacks
3.N LOCKHART, ANDREW Network Security Hacks
3.N LUBY, MICHAEL Pseudorandomness and Cryptographic Applications
3.N LUCAS, MICHAEL W. SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
3.N LUDWIG, MARK The Giant Black Book of Computer Viruses
3.N MACAULAY, TYSON RIoT Control: Understanding and Managing Risks and the Internet of Things
3.N MALOOF, MARCUS A Machine Learning and Data Mining for Computer Security: Methods and Applications
3.N MANSFIELD, KENNETH C. Computer Networking from LANs to WANs: Hardware, Software, and Security
3.N MAO, WENBO Modern Cryptography: Theory and Practice
3.N MARAS, MARIE-HELEN Computer Forensics: Cybercriminals, Laws, and Evidence
3.N MARTINELLI, STEVE Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone, OpenStack’s Identity Service
3.N MATHER, TIM Cloud Security and Privacy
3.N MCCLURE, STUART Hacking Exposed: Network Security Secrets and Solutions
3.N MCGRAW, GARY Java Security: Hostile Applets, Holes, and Antidotes: What Every Netscape and Internet Explorer User Needs to Know
3.N MCINERNEY, MICHAEL Windows NT Security
3.N MCLOONE, MAIRE System-on-Chip Architectures and Implementations for Private-Key Data Encryption
3.N MEHAN, JULIE E. CyberWar, CyberTerror, CyberCrime and CyberActivism: An in-depth guide to the role of standards in the cybersecurity environment
3.N MEHROTRA, KISHAN G. Anomaly Detection Principles and Algorithms
3.N MENEZES, ALFRED Elliptic Curve Public Key Cryptosystems
3.N MENEZES, ALFRED J. Handbook of Applied Cryptography
3.N MEYER, CARL H Cryptography: A New Dimension in Computer Data Security: A Guide for the Design and Implementation of Secure Systems
3.N MINASI, MARK Administering Windows Vista Security: The Big Surprises
3.N MITNICK, KEVIN D. The Art of Deception: Controlling the Human Element of Security
3.N MMM-ACNS MMM-ACNS 2001: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security: International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings
3.N MM&SEC MM&Sec 2007: MM&Sec '07: Proceedings of the Multimedia & Security Workshop 2007: Dallas, Texas, USA, September 20-21, 2007
3.N MM&SEC MM&Sec 2008: MM&Sec'08: Proceedings of the Multimedia & Security Workshop 2008: Oxford, United Kingdom, September 22-23, 2008
3.N MM&SEC MM&Sec 2009: MM&Sec'09: Proceedings of the 2009 ACM SIGMM Multimedia and Security Workshop 2009: September 7-8, 2009, Princeton, New Jersey, USA
3.N MOELLER, ROBERT R Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
3.N MOELLER, ROBERT R. Executive’s Guide to COSO Internal Controls: Understanding and Implementing the New Framework
3.N MONTE, MATTHEW Network Attacks & Exploitation
3.N MURAMATSU, HIDEKAZU 図解入門よくわかるインターネットセキュリティと「安号」の仕組み (How‐nual図解入門)
3.N NASH, ANDREW PKI: Implementing and Managing Esecurity
3.N NATAN, RON BEN Implementing Database Security and Auditing
3.N NAUHEIMER, FRANK Development of a Lattice Based Blind Signature Scheme: Post-quantum Cryptography
3.N NEUENSCHWANDER, DANIEL Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
3.N NEW SECURITY New Security Paradigms Workshop
3.N NEW SECURITY New Security Paradigms Workshop
3.N NEWTON, DAVID E Encyclopedia of Cryptology
3.N NIEDERREITER, HARALD Coding Theory and Cryptology
3.N NIST A Framework for Designing Cryptographic Key Management Systems
3.N NIST Cryptographic Key Management Workshop Summary: June 8-9, 2009
3.N NIST Recommendation for Key Management - Part 1: General (Revision 3)
3.N NIST Recommendation for Key Management - Part 2: Best Practices for Key Management Organization
3.N NIST Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
3.N NORDSEC NORDSEC 1998: The Third Workshop on Secure IT Systems (NORDSEC '98): Trondheim, Norway, November 5-6, 1998: proceedings
3.N OAKS, SCOTT Java Security
3.N O'LEARY, MIKE Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
3.N O’NEILL, MARK Web Services Security
3.N OPPLIGER, ROLF Authentication Systems for Secure Networks
3.N OPPLIGER, ROLF Contemporary Cryptography
3.N ORONDI, OMONDO Identity & Access Management: A Systems Engineering Approach
3.N PABBATHI, KIRAN KUMAR Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions
3.N PAIRING PAIRING 2007: Pairing-Based Cryptography: 1st International Conference, Tokyo, Japan, July 2-4, 2007: proceedings
3.N PAISI PAISI 2007: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007: proceedings
3.N PATTERSON, WAYNE Mathematical Cryptology for Computer Scientists and Mathematicians
3.N PELTIER, THOMAS R Information Security Risk Analysis
3.N PET PET 2006: Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006: revised selected papers
3.N PET PET 2007: Privacy Enhancing Technologies: 7th International Symposium, PET 2007, Ottawa, Canada, June 20-22, 2007: revised selected papers
3.N PFITZMANN, BIRGIT Digital Signature Schemes: General Framework and Fail-Stop Signatures
3.N PIEPRZYK, JOSEF Design of Hashing Algorithms
3.N PKC PKC 1998: Public Key Cryptography: 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998: proceedings
3.N PKC PKC 1999: Public Key Cryptography: 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999: proceedings
3.N PKC PKC 2000: Public Key Cryptography: 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000: proceedings
3.N PKC PKC 2001: Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001: proceedings
3.N PKC PKC 2002: Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002: proceedings
3.N PKC PKC 2003: Public Key Cryptography: 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003: proceedings
3.N PKC PKC 2004: Public Key Cryptography: 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004: proceedings
3.N PKC PKC 2005: Public Key Cryptography: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005: proceedings
3.N PKC PKC 2006: Public Key Cryptography: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings
3.N PKC PKC 2007: Public Key Cryptography: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007: proceedings
3.N PKC PKC 2008: Public Key Cryptography - PKC 2008: 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008: Proceedings
3.N PKC Public Key Cryptography - PKC 2009
3.N PKC Public Key Cryptography - PKC 2010
3.N PKC Public Key Cryptography - PKC 2011
3.N PKC Public Key Cryptography - PKC 2013
3.N PKC Public Key Cryptography - PKC 2014
3.N POHLMAN, MARLIN B Oracle Identity Management: Governance, Risk, and Compliance Architecture
3.N POLICY POLICY 2001: Policies for Distributed Systems and Networks: International Workshop, POLICY 2001, Bristol, UK, January 29-31, 2001, Proceedings
3.N POMERANCE, CARL Cryptology and Computational Number Theory
3.N PORTER, THOMAS Practical VoIP Security: [Elektronisk resurs]
3.N PQCRYPTO Post-Quantum Cryptography: 10th International Workshop, PQCrypto 2019
3.N PQCRYPTO Post-Quantum Cryptography: 11th International Workshop, PQCrypto 2020
3.N PQCRYPTO Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021
3.N PQCRYPTO Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011
3.N PQCRYPTO Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013
3.N PQCRYPTO Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016
3.N PQCRYPTO Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017
3.N PQCRYPTO Post-Quantum Cryptography: 9th International Workshop, PQCrypto 2018
3.N PQCRYPTO Post-Quantum Cryptography, Proceedings, PQCrypto 2010
3.N PQCRYPTO Post-Quantum Cryptography, Proceedings, PQCrypto 2014
3.N PQCRYPTO Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008
3.N PRAGOCRYPT Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT ’96, vol 1
3.N PRAGOCRYPT Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT ’96, vol 2
3.N PRENEEL, BART State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures
3.N PSD PSD 2006: Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006: proceedings
3.N PSD PSD 2008: Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings
3.N PUBLIC Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
3.N PURPURA, PHILIP P. Security and Loss Prevention: An Introduction
3.N QOP QoP' 07: Quality of Protection: Proceedings of the 2007 ACM Workshop. Alexandria, Virginia, USA. October 29, 2007.
3.N QUANTUM SAFE Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges
3.N RADHAKRISHNAN, RAKESH Identity & Security: A Common Architecture & Framework for SOA and Network Convergence
3.N RAID RAID 2000: Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings
3.N RAID RAID 2007: Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings
3.N RAID RAID 2008: Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Proceedings
3.N RAJ, ADITYA MOSH (MOBILE SHELL): A New Era of Remote Access
3.N RAMEY, KENNETH Pro Oracle Identity and Access Management Suite
3.N RANKIN, KYLE Linux Hardening in Hostile Networks: Server Security from TLS to Tor
3.N RANKL, W. Smart Card Handbook
3.N RATTRAY, GREGORY J Strategic Warfare in Cyberspace
3.N REID, JASON Secure Shell in the Enterprise
3.N REID, JASON Secure Shell in the Enterprise
3.N RHEE, MAN YOUNG CDMA Cellular Mobile Communications and Network Security
3.N RHEE, MAN YOUNG Cryptography and Secure Communications
3.N RHEE, MAN YOUNG Internet Security: Cryptographic Principles, Algorithms and Protocols
3.N RHOTON, JOHN Cloud Computing Protected
3.N RIEDEL, SVEN SSH: kurz & gut
3.N ROONEY, ANNE Computer Science and IT: Investigating a Cyber Attack
3.N ROPER, CARL A. Risk Management for Security Professionals
3.N ROTENBERG, LEO J Making Computers Keep Secrets
3.N ROZENBLIT, MOSHE Security for Telecommunications Network Management
3.N RUBIN, AVIEL D. Web Security Sourcebook: A Complete Guide to Web Security Threats and Solutions
3.N RUIZ, KEVIN Active Directory 33 Success Secrets, 33 Most Asked Questions On Active Directory, What You Need To Know
3.N RUSSELL, BRIAN Practical Internet of Things Security
3.N RUSSELL, DEBORAH Computer Security Basics
3.N SAC SAC 1998: Selected Areas in Cryptography: 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998: proceedings
3.N SAC SAC 1999: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999: proceedings
3.N SAC SAC 2000: Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000: proceedings
3.N SAC SAC 2001: Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001: revised papers
3.N SAC SAC 2002: Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002: revised papers
3.N SAC SAC 2003: Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003: revised papers
3.N SAC SAC 2004: Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004: revised selected papers
3.N SAC SAC 2005: Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: revised selected papers
3.N SAC SAC 2006: Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers
3.N SAC Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009
3.N SAC Selected Areas in Cryptography: 17th Annual International Workshop, SAC 2010
3.N SAC Selected Areas in Cryptography: 20th Annual International Workshop, SAC 2013
3.N SAC Selected Areas in Cryptography: 22nd Annual International Workshop, SAC 2015
3.N SACCO, LUIGI Manuel de Cryptographie
3.N SACMAT SACMAT 2001: Sixth ACM Symposium on Access Control Models and Technologies. Proceedings. Litton-TASC, Westfields II Conference Facility. May 3-4, 2001, Chantilly, Virginia, USA
3.N SACMAT SACMAT 2002: Seventh ACM Symposium on Access Control Models and Technologies. June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA
3.N SACMAT SACMAT 2003: Eighth ACM Symposium on Access Control Models and Technologies. June 2-3, 2003, Villa Gallia, Como, Italy
3.N SACMAT SACMAT 2006: Eleventh ACM Symposium on Access Control Models and Technologies. June 7-9, 2006, Lake Tahoe, California, USA
3.N SACMAT SACMAT 2007: 12th ACM Symposium on Access Control Models and Technologies: Sophia Antipolis, France, June 20-22, 2007
3.N SACMAT SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies: Estes Park, Colorado, USA, June 11-13, 2008
3.N SACMAT SACMAT 2009: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies: Stresa, Italy, June 3-5, 2009
3.N SACMAT SACMAT 2010: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies: June 9-11, 2010, Pittsburgh, Pennsylvania, USA
3.N SAFECOMP SAFECOMP 1998: Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings
3.N SAFECOMP SAFECOMP 1999: Computer Safety, Reliability and Security: 18th International Conference, SAFECOMP'99, Toulouse, France, September 27-29, 1999, Proceedings
3.N SAFECOMP SAFECOMP 2000: Computer Safety, Reliability and Security: 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings
3.N SAFEGUARDING Safeguarding the E-Business Network: The war against Hackers and Crackers
3.N SALMINEN, MARKUS Tietosuoja Sähköisessä Liiketoiminnassa
3.N SALOMAA, ARTO Public-Key Cryptography
3.N SAMANI, RAJ CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security
3.N SANDERS, CHRIS Applied Network Security Monitoring: Collection, Detection, and Analysis
3.N SANTUKA, VIVEK AAA Identity Management Security
3.N SCAMBRAY, JOEL Hacking Exposed Windows 2000: Network Security Secrets and Solutions
3.N SCHEIDEL, JEFF Designing an IAM Framework with Oracle Identity and Access Management Suite
3.N SCHNEIER, BRUCE Applied Cryptography: Protocols, Algorithms, and Source Code in C
3.N SCHNEIER, BRUCE E-Mail Security: How to Keep Your Electronic Messages Private
3.N SCHNEIER, BRUCE the Electronic Privacy Papers: Documents in the Age of Surveillance
3.N SCHOENFIELD, BROOK S.E. Securing Systems: Applied Security Architecture and Threat Models
3.N SCHÖLER, SABINE CobiT and the Sarbanes-Oxley Act: The SOX Guide for SAP Operations
3.N SCHOU, COREY Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
3.N SCN SCN 2008: Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
3.N SCOTT, CHARLIE Virtual Private Networks
3.N SCOTT, CHARLIE Virtual Private Networks
3.N SECURITY Security and Privacy
3.N SECURITY PROTOCOLS Security Protocols 1996: Security Protocols: International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings
3.N SECURITY PROTOCOLS Security Protocols 1997: Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
3.N SECURITY PROTOCOLS Security Protocols 1998: 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
3.N SECURITY PROTOCOLS Security Protocols 1999: Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
3.N SECURITY PROTOCOLS Security Protocols 2005: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
3.N SENFT, SANDRA Information Technology Control and Audit
3.N SERGIENKO, ALEXANDER V Quantum Communications and Cryptography
3.N SETA SETA 2006: Sequences and Their Applications: 4th International Conference, Beijing, China, September 24-28, 2006: proceedings
3.N SETA SETA 2008: Sequences and Their Applications - SETA 2008: 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings
3.N SHACKLEFORD, DAVE Virtualization Security: Protecting Virtualized Environments
3.N SHOSTACK, ADAM Threat Modeling: Designing for Security
3.N SIBERIUS, JEFFREY Blockchain: The Complete Guide To Understanding The Technology Behind Cryptocurrency
3.N SILVERMAN, JOSEPH H Advanced Topics in the Arithmetic of Elliptic Curves
3.N SILVERMAN, JOSEPH H The Arithmetic of Elliptic Curves
3.N SIMMONS, GUSTAVUS J Contemporary Cryptology: The Science of Information Integrity
3.N SIMONDS, FRED Network Security: Data and Voice Communications
3.N SINGH, SIMON Koodikirja: Salakirjoituksen historia muinaisesta Egyptistä kvanttikryptografiaan
3.N SMALLWOOD, ROBERT F. Information Governance: Concepts, Strategies and Best Practices
3.N SMITH, GEORGE C. The Virus Creation Labs: A Journey Into the Underground
3.N SMITH, ROBERT SOX Compliance: The Definitive IT Policy and Procedure Development Gude
3.N SNOOK, ANDY Netsuite Security and Audit Field Manual
3.N SOBE, ANITA Single Sign-On in IMS-Based IPTV Systems: Towards the Interworking of the Generic Bootstrapping Architecture and Liberty Alliance Indentity Federation
3.N SOOD, ADITYA K. Targeted Cyber Attacks: Multi-staged Attacks Driben by Exploits and Malware
3.N SPASOVSKI, MARTIN OAuth 2.0 Identity and Access Management Patterns: A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0
3.N SSC SSC 2007: Sequences, Subsequences, and Consequences: International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers
3.N STAHNKE, MICHAEL Pro OpenSSH
3.N STALLINGS, WILLIAM Cryptography and Network Security: Principles and Practice
3.N STC STC '07: Scalable Trusted Computing: Proceedings of the 2007 ACM Workshop
3.N STEIN, THOMAS Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks
3.N STEWART, IAN Galois Theory
3.N STEWART, JAMES MICHAEL CISSP: Certified Information Systems Security Professional Study Guide
3.N STIENNON, RICHARD Surviving Cyberwar
3.N STIENNON, RICHARD There Will Be Cyberwar: How the Move to Network-Centric Warfighting Set The Stage For Cyberwar
3.N STINSON, DOUGLAS R Cryptography: Theory and Practice
3.N STORAGESS StorageSS '05: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability: Fairfax, Virginia, USA , November 11, 2005, (co-located with CSS 2005)
3.N STORAGESS StorageSS '07: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability: Alexandria, Virginia, USA, October 29, 2007
3.N SUOMEN AUTOMAATIOSEURA Automaation tietoturva: Kriittisen tuotannon turvaaminen
3.N SZOR, PETER The Art of Computer Virus Research and Defense
3.N TALABIS, MARK RYAN M. Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
3.N TALBOT, JULIAN Security Risk Management: Body of Knowledge
3.N TAPSCOTT, DON Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World
3.N TARAKANOV, A. O. Immunocomputing: Principles and Applications
3.N TCC TCC 2004: Theory of Cryptography: 1st Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 2004: proceedings
3.N TCC TCC 2005: Theory of Cryptography: 2nd Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005: proceedings
3.N TCC TCC 2006: Theory of Cryptography: 3rd Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006: proceedings
3.N TCC TCC 2007: Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007: proceedings
3.N TECUCI, GHEORGHE Intelligence Analysis as Discovery of Evidence, Hypotheses, and Arguments
3.N THERMOS, PETER Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
3.N THURAISINGHAM, BHAVANI M Database Security, VI: Status and Prospects: Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August, 1992
3.N TODOROV, DOBROMIR Mechanics of User Identification and Authentication: Fundamentals of Identity Management
3.N TRANSACTIONS Transactions on Data Hiding and Multimedia Security II
3.N TRAPPE, WADE Introduction to Cryptography: With Coding Theory
3.N TREC TREC 1998: Trends in Distributed Systems for Electronic Commerce: International IFIP/GI Working Conference, TREC'98, Hamburg, Germany, June 3-5, 1998, Proceedings
3.N TRIM, PETER Cyber Security Management: A Governance, Risk and Compliance Framework
3.N TRUST TRUST 2008: Trusted Computing - Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings
3.N TRUSTBUS TrustBus 2007: Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, proceedings
3.N TRUSTBUS TrustBus 2008: Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings
3.N UMAÑA, VALÉRIE GAUTHIER Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes
3.N USS 1992 USENIX Security Symposium 1992: Baltimore, Maryland, September 14-16, 1992: proceedings
3.N USS 1993 USENIX Security Symposium 1993: October 4-5, 1993, Santa Clara, California: proceedings
3.N USS 1995 USENIX Security Symposium 1995: June 5-7, 1995, Salt Lake City, Utah, USA
3.N USS 1996 USENIX Security Symposium 1996: July 22-25, 1996, San Jose, California
3.N USS 1998 USENIX Security Symposium 1998: January 26-29, 1998, San Antonio, Texas
3.N USS 1999 USENIX Security Symposium 1999: August 23-26, 1999, Washington, D.C., USA
3.N USS 2000 USENIX Security Symposium 2000: August 14-17, 2000, Denver, Colorado, USA
3.N USS 2002 USENIX Security Symposium 2002: August 5-9, 2002, San Francisco, CA, USA
3.N USS 2003 USENIX Security Symposium 2003: August 4-8, 2003, Washington, D.C., USA
3.N USS 2004 USENIX Security Symposium 2004: August 9-13, 2004, San Diego, CA, USA
3.N USS 2005 USENIX Security Symposium 2005: July 31-August 5, 2005, Baltimore, MD, USA
3.N USS 2006 USENIX Security Symposium 2006: July 31 - August 4, 2006, Vancouver, B.C., Canada
3.N VAN ASSCHE, GILLES Quantum Cryptography and Secret-Key Distillation
3.N VIETCYRPT VIETCRYPT 2006: Progress in Cryptology: 1st International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006: revised selected papers
3.N VIGNA, GIOVANNI Mobile Agents and Security
3.N VITEK, JAN Secure Internet Programming: Security Issues for Mobile and Distributed Objects
3.N VIZSEC VizSec 2008: Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
3.N VIZSEC/DMSEC VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004
3.N VOTE-ID VOTE-ID 2007: E-Voting and Identity: 1st International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007: revised selected papers
3.N WAGSTAFF, SAMUEL S Cryptanalysis of Number Theoretic Ciphers
3.N WAIFI WAIFI 2007: Arithmetic of Finite Fields: First International Workshop, WAIFI 2007, Madrid, Spain, June 2007: proceedings
3.N WAIFI WAIFI 2008: Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings
3.N WALKER, BRUCE JAMES Computer Security and Protection Structures
3.N WALKER, JOHN The Digital Imprimatur: How Big Brother and Big Media can put the Internet Genie Back in the Bottle
3.N WASHINGTON, LAWRENCE C Elliptic Curves: Number Theory and Cryptography
3.N WEISS, MARTIN M. Auditing IT Infrastructure for Compliance
3.N WESTERMAN, GEORGE IT Risk: Turning Business Threats into Competitive Advantage
3.N WHEELER, EVAN Security Risk Management: Building and Information Security Risk Management Program from the Groung Up
3.N WHITMAN, MICHEAL Management of Information Security
3.N WILLIAMS, BARRY L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
3.N WILLIAMS, BRANDEN R. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
3.N WILLIAMS, BRANDEN R. PCI DSS 3.1: The Standard That Killed SSL
3.N WILLIAMSON, GRAHAM Identity Management: A Primer
3.N WILSON, S.H Quick Look Report
3.N WINDLEY, PHILLIP J. Digital Identity
3.N WINKLER, VIC (J.R.) Securing the Cloud: Cloud Computer Security Techniques and Tactics
3.N WISA WISA 2006: Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006: revised selected papers
3.N WISA WISA 2007: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
3.N WISE WISe 2002: Wireless Security: Proceedings of the 2002 ACM Workshop on Wireless Security. Co-located with MobiCom 2002 conference: September 28, 2002, Atlanta, Georgia, USA.
3.N WISE WISe 2003: Wireless Security: Proceedings of the 2003 ACM Workshop on Wireless Security. Co-located with MobiCom 2003 Conference. September 19, 2003, California, USA
3.N WISE WISe 2004: Wireless Security: Proceedings of the 2004 ACM Workshop on Wireless Security: Co-Located with MobiCom 2004 Conference, October 1, 2004, Philadelphia, Pennsylvania, USA
3.N WISE WISe 2005: Wireless Security: Proceedings of the 2005 ACM Workshop on Wireless Security. Co-Located with MobiCom 2005 Conference. September 2, 2005, Cologne, Germany
3.N WISEC WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security: Alexandria, Virginia, USA, March 31 - April 2, 2008
3.N WISEC WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security: Zurich, Switzerland, March 16-18, 2009
3.N WISEC WiSec 2010: Proceedings of the Third ACM Conference on Wireless Network Security: WiSec'10: March 22-24, 2010, Hoboken, New Jersey, USA
3.N WISTP WISTP 2007: Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007: proceedings
3.N WISTP WISTP 2008: Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Proceedings
3.N WITHINGTON, P TUCKER The Trusted Function in Secure Decentralized Processing
3.N WOBST, REINHARD Cryptology Unlocked
3.N WOFSEY, MARVIN M Advances in Computer Security Management: Volume 2
3.N WOOD, MICHAEL B Introducing Computer Security
3.N WORM WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode: Washington, DC, USA, October 27, 2003
3.N WORM WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode, Washington, DC, USA, October 29, 2004, co-located with CSS 2004
3.N WORM WORM '05: Proceedings of the 2005 ACM Workshop on Rapid Malcode, November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005
3.N WPES WPES '02: Privacy in the Electronic Society: Washington, DC, USA, November 21, 2002,: (in association with 9th ACM Conference on Computer and Communications Security)
3.N WPES WPES '03: Privacy in the Electronic Society: Washington, DC, USA, October 30, 2003: co-located with CCS '03
3.N WPES WPES '04: Privacy in the Electronic Society: Washington, DC, USA, October 28, 2004: co-located with CCS 2004
3.N WPES WPES '05: Privacy in the Electronic Society: Alexandria, Virginia, USA, November 7, 2005 (co-located with CCS 2005)
3.N WPES WPES '07: Privacy in the Electronic Society: Alexandria, Virginia, USA, October 29, 2007,
3.N WRIGHT, STEVE PCI DSS: A Practical Guide to Implementing and Maintaining Compliance
3.N XML SECURITY XML SECURITY: Proceedings of the ACM Workshop on XML Security 2003: In Association with 10th ACM Conference on Computer and Communications Security: Fairfax, VA, USA, October 31, 2003.
3.N YAN, SONG Y Primality Testing and Integer Factorization in Public-Key Cryptography
3.N YAN, SONG Y. Quantum Attacks on Public-Key Cryptosystems
3.N YELURI, RAGHU Building the Infrastructure for Cloud Security
3.N YOUNG, ADAM L Malicious Cryptography: Exposing Cryptovirology
3.N ZHU, SHAO YING Guide to Security Assurance for Cloud Computing
3.N ZIEGLER, ROBERT L. Linux Firewalls
3.N ZWICKY, ELIZABETH D. Building Internet Firewalls