Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Data protection
A sample of Items that share the Concept Data protection See All
Context
Context of Data protectionSubject of
No resources found
No enriched resources found
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 5G Enabled Secure Wireless Networks
- 99 privacy breaches to beware of : practical data protection tips from real-life experiences
- A practical guide to security assessments
- A survey of data leakage detection and prevention solutions
- Active Directory Disaster Recovery
- Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings
- Ad Hoc Networks : 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers
- Ad-hoc, Mobile, and Wireless Networks : 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings
- Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website
- Advanced Hybrid Information Processing : Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21-22, 2019, Proceedings, Part I
- Advanced Information Systems Engineering Workshops : CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014. Proceedings
- Advanced Information Systems Engineering Workshops : CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings
- Advanced Research on Electronic Commerce, Web Application, and Communication : International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I
- Advances In Artificial Intelligence For Privacy Protection And Security
- Advances in Brain Inspired Cognitive Systems : 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings
- Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
- Advances in Cryptology - ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
- Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
- Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
- Advances in Cryptology - CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
- Advances in Cryptology - CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
- Advances in Cryptology - CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
- Advances in Cryptology - CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
- Advances in Cryptology - EUROCRYPT 2013 : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
- Advances in Cryptology - EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
- Advances in Cryptology - EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II
- Advances in Cryptology -- CRYPTO 2015 : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
- Advances in Cryptology -- CRYPTO 2015 : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II
- Advances in Cryptology -- EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
- Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II
- Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
- Advances in Cyber Security : First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers
- Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers
- Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers
- Advances in Information and Computer Security : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
- Advances in Information and Computer Security : 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
- Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
- Advances in Information and Computer Security : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
- Advances in Information and Computer Security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- Advances in Multimedia Information Processing ? PCM 2018 : 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part I
- Advances in Multimedia Information Processing ? PCM 2018 : 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II
- Advances in Multimedia Information Processing ? PCM 2018 : 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part III
- Advances in Security of Information and Communication Networks : First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
- An Introduction to Information Security and ISO27001 : 2013
- An introduction to information security and ISO27001 : a pocket guide
- Analyzing and securing social networks
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Android malware
- Anonymization
- Anonymous communication networks : protecting privacy on the web
- Anonymous multicast communication for wireless sensor networks using layered encryption and hashing
- Anti-hacker tool kit
- Application of big data for national security : a practitioner's guide to emerging technologies
- Applications and Techniques in Information Security : 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings
- Applications and Techniques in Information Security : 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings
- Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9?11, 2018, Proceedings
- Applied Cryptography and Network Security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
- Applied Cryptography and Network Security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
- Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
- Applied information security : a hands-on approach
- Architecting User-Centric Privacy-as-a-Set-of-Services : Digital Identity-Related Privacy Framework
- Artificial Intelligence for Communications and Networks : First EAI International Conference, AICON 2019, Harbin, China, May 25-26, 2019, Proceedings, Part II
- Artificial Neural Networks and Machine Learning ? ICANN 2018 : 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I
- Artificial Neural Networks and Machine Learning ? ICANN 2018 : 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II
- Artificial Neural Networks and Machine Learning ? ICANN 2018 : 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III
- Aspect-Oriented Security Hardening of UML Design Models
- Assessing and Managing Security Risk in IT Systems
- Assessing and managing security risk in IT systems : a structured methodology
- Auditing cloud computing : a security and privacy guide
- Automated security management
- Automated security self-evaluation tool user manual
- Autonomic and Trusted Computing : 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings
- Autonomous Cyber Deception : Reasoning, Adaptive Planning, and Evaluation of HoneyThings
- Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
- Backing up Oracle : using Tivoli Storage Management
- Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
- Big breaches : cybersecurity lessons for everyone
- Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
- Biometric Recognition : 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings
- Blockchain and Trustworthy Systems : Second International Conference, BlockSys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers
- Broadband Communications, Networks, and Systems : 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19-20, 2018, Proceedings
- Building a global information assurance program
- Building an information security awareness program
- Building secure firmware : armoring the foundation of the platform
- Business continuity planning for data centers and systems : a strategic implementation guide
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- Cellular Automata : 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17?21, 2018, Proceedings
- Children's online privacy and data protection in selected European countries
- Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I
- Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II
- Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8?10, 2018, Revised Selected Papers, Part III
- Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8?10, 2018, Revised Selected Papers, Part IV
- Cloud computing security : foundations and challenges
- Cloud storage security : a practical guide
- Cloud storage security : a practical guide
- Codes, Cryptology, and Information Security : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
- Codes, ciphers, and computers : an introduction to information security
- Cognitive Radio Oriented Wireless Networks : 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18-20, 2018, Proceedings
- Collaborative financial infrastructure protection : tools, abstractions, and middleware
- Communication in a wired world : be smart, be safe
- Communications and Multimedia Security : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
- Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
- Communications and Multimedia Security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings
- Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II
- Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings
- Computational intelligence in information assurance and security
- Computer Networks : 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings
- Computer Networks and Distributed Systems : International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers
- Computer Performance Engineering : 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings
- Computer Safety, Reliability, and Security : 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings
- Computer Safety, Reliability, and Security : 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings
- Computer Safety, Reliability, and Security : 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedings
- Computer Safety, Reliability, and Security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings
- Computer Security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
- Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
- Computer Vision ? ECCV 2018 : 15th European Conference, Munich, Germany, September 8?14, 2018, Proceedings, Part V
- Computer and communications security and privacy : report
- Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online privacy
- Computer security policy issues : from past toward the future
- Constructive Side-Channel Analysis and Secure Design : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers
- Context-Aware Systems and Applications, and Nature of Computation and Communication : 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22-23, 2018, Proceedings
- Continued Rise of the Cloud : Advances and Trends in Cloud Computing
- Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
- Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Counterterrorism and Cybersecurity : Total Information Awareness
- Crackproof your software : the best ways to protect your software against crackers
- Critical Information Infrastructure Security : 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
- Critical Information Infrastructures Security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
- Critical Information Infrastructures Security : 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
- Critical Information Infrastructures Security : 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
- Critical Infrastructure Protection VII : 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers
- Critical Infrastructure Protection VIII : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers
- Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies
- Cryptanalytic Attacks on RSA
- Cryptographic Hardware and Embedded Systems ? CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
- Cryptography and Coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
- Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
- Cryptography and Coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
- Cryptography and Information Security in the Balkans : First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers
- Cryptography and Security Systems : Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
- Cryptography and data security
- Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
- Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
- Customer data and privacy : the insights you need from Harvard Business Review
- Cyber Security and Privacy : Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
- Cyber Security and Privacy : Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers
- Cyber Security: Analytics, Technology and Automation
- Cyber Threat Intelligence
- Cyber Warfare : Building the Scientific Foundation
- Cybercryptography: Applicable Cryptography for Cyberspace Security
- Cyberpatterns : Unifying Design Patterns with Security and Attack Patterns
- Cybersecurity Systems for Human Cognition Augmentation
- Cybersecurity for SCADA systems
- Cybersecurity for industrial scada systems
- Cybersecurity in Switzerland
- Cyberspace Safety and Security : 10th International Symposium, CSS 2018, Amalfi, Italy, October 29?31, 2018, Proceedings
- Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
- Cyberterror, Bringing Down the Internet
- Cyberterrorism : Understanding, Assessment, and Response
- Data : Ethical Use and Storage
- Data Hiding : Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
- Data Hiding Techniques in Windows OS : a Practical Approach to Investigation and Defense
- Data Privacy Management and Autonomous Spontaneous Security : 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
- Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
- Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings
- Data Protection and Information Lifecycle Management
- Data Protection and the Cloud - Are You Really Managing the Risks? : Second Edition
- Data and Applications Security and Privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
- Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
- Data and Applications Security and Privacy XXVIII : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
- Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop
- Data governance : frameworks and strategies
- Data governance : how to design, deploy and sustain an effective data governance program
- Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
- Data hiding techniques in Windows OS : a practical approach to investigation and defense
- Data privacy : principles and practice
- Data privacy in the information age
- Data protection : ensuring data availability
- Data protection and consumer privacy : an Emerald guide
- Data protection and information lifecycle management
- Data protection and the cloud : are the risks too great?
- Data protection and the cloud : are the risks too great?
- Data protection at work
- Data security and privacy training
- Data stewardship : an actionable guide to effective data management and data governance
- Data stewardship : an actionable guide to effective data management and data governance
- Data storage for social networks : a socially aware approach
- Data thieves in action : examining the international market for stolen personal information
- Date flows, online privacy, and trade policy
- Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings
- Decision and Game Theory for Security : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29?31, 2018, Proceedings
- Decision and Game Theory for Security : Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings
- Dependable and historic computing : essays dedicated to Brian Randell on the occasion of his 75th birthday
- Deployment guide for Infosphere Guardium
- Deployment guides series, IBM Tivoli Compliance Insight Manager
- Detecting Peripheral-based Attacks on the Host Memory
- Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
- Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
- Digital Forensics and Cyber Crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings
- Digital Forensics and Cyber Crime : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
- Digital Forensics and Cyber Crime : Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
- Digital Forensics and Watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers
- Digital data integrity : the evolution from passive protection to active management
- Digital enlightenment yearbook 2014 : social networks and social machines, surveillance and empowerment
- Digital identity
- Digital identity management
- Digital identity management
- Digital privacy in the marketplace : perspectives on the information exchange
- Digital watermarking
- Digital watermarking and steganography
- Digital-Forensics and Watermarking : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
- Digital-Forensics and Watermarking : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
- Distributed Computing and Networking : 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings
- Distributed Computing and Networking : 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedings
- Distributed Networks
- Distributed and collaborative watermarking in relational data
- Distributed and collaborative watermarking in relational data
- Dropbox : Sicher speichern und effektiv arbeiten in der Cloud
- E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age : 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings
- E-Democracy, Security, Privacy and Trust in a Digital World : 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers
- E-Voting and Identify : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
- E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings
- Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
- Electronic Identity
- Electronic Voting : Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings
- Encrypted Email : The History and Technology of Message Privacy
- Encryption for organizations and individuals : basics of contemporary and quantum cryptography
- Encyclopedia of Biometrics
- Engaging privacy and information technology in a digital age
- Engineering Applications of Neural Networks : 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings
- Engineering Secure Future Internet Services and Systems : Current Research
- Engineering information security : the application of systems engineering concepts to achieve information assurance
- Enterprise Security : Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers
- Enterprise architecture and information assurance : developing a secure foundation
- Enterprise information security and privacy
- Examination of the GAO audit series of HHS cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, June 20, 2018
- Expert Oracle and Java security : programming secure Oracle database applications with Java
- Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
- FISMA certification & accreditation handbook
- Facebook nation : total information awareness
- Fast Software Encryption : 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
- Fast Software Encryption : 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers
- Fast Software Encryption : 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
- Fault analysis in cryptography
- Financial Cryptography and Data Security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
- Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
- Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
- Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
- Financial Cryptography and Data Security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
- For the Record : Protecting Electronic Health Information
- Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
- Foundations and Practice of Security : 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers
- Foundations of Security Analysis and Design VII : FOSAD 2012/2013 Tutorial Lectures
- Foundations of security analysis and design VI : FOSAD tutorial lectures
- Frontiers in Cyber Security : Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings
- Frontiers in Internet Technologies : Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers
- Frontiers in Internet Technologies : Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers
- Fundamentals and Applications of Hardcopy Communication : Conveying Side Information by Printed Media
- Fundamentals of Sketch-Based Passwords : A General Framework
- Future Business Software : Current Trends in Business Software Development
- Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications : 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25-27, 2020, Proceedings
- Future Internet Technologies and Trends : First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings
- Future Network Systems and Security : 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings
- Future Network Systems and Security : First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings
- G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization
- Game Theoretic Analysis of Congestion, Safety and Security : Networks, Air Traffic and Emergency Departments
- Game Theoretic Analysis of Congestion, Safety and Security : Traffic and Transportation Theory
- Geo-tagging and privacy-preservation in mobile cloud computing
- Getting started with OAuth 2.0
- Global Security, Safety and Sustainability & e-Democracy : 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers
- Guidance concerning the use of Enterprise Rights Management (ERM) and other encryption-related software on federal records
- Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach
- Hadoop security
- Handbook on Data Centers
- How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardship
- How to build privacy and security into deep learning models
- How to choose the right digital leader for your company : Striking the right competence-credibility balance for digital leaders depends largely on how the role of the CDO is defined in a particular company
- How to secure and audit Oracle 10g and 11g
- How to survive a data breach : a pocket guide
- IBM InfoSphere : a Platform for Big Data Governance and Process Data Governance
- IBM QRadar Version 7.3 : planning and installation guide
- IBM system storage TS7650, TS7650G, and TS7610
- IBM system storage solutions for smarter systems
- ICT Systems Security and Privacy Protection : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
- ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
- ICT Systems Security and Privacy Protection : 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
- ICT and Society : 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings
- IEEE Std 1619-2007 : IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
- ISO 37001 : an Introduction to Anti-Bribery Management Systems
- ISO27001 / ISO27002 : a pocket guide / Alan Calder
- ISO27001/ISO27002 : 2013
- ISO27001/ISO27002 : a pocket guide
- ISSE 2009 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2009 Conference
- ISSE 2013 securing electronic business processes : highlights of the information security solutions Europe 2013 Conference
- IT-SICHERHEITSMANAGEMENT;DAS UMFASSENDE PRAXIS-HANDBUCH FUR IT- SECURITY UND TECHNISCHEN DATENSCHUTZ NACH ISO 27001
- IT-Sicherheit im Unternehmen
- IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage
- Implementing Database Security and Auditing
- Implementing high availability and disaster recovery in IBM PureApplication Systems V2
- Industrial Networks and Intelligent Systems : 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings
- Information Assurance and Security Education and Training : 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
- Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings
- Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
- Information Security : 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers
- Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
- Information Security : 21st International Conference, ISC 2018, Guildford, UK, September 9?12, 2018, Proceedings
- Information Security Applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
- Information Security Applications : 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
- Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
- Information Security Management : Concepts and Practice
- Information Security Management Handbook, Volume 6, 6th Edition
- Information Security Practice and Experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
- Information Security Practice and Experience : 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
- Information Security Practice and Experience : 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
- Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
- Information Security Technology for Applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
- Information Security Technology for Applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
- Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24?25, 2015 Proceedings
- Information Security Theory and Practice. Securing the Internet of Things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings
- Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
- Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information Security and Cryptology - ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
- Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
- Information Security and Cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
- Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
- Information Security for Management
- Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
- Information Systems Security : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings
- Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
- Information Systems: Research, Development, Applications, Education : 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings
- Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
- Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
- Information Warfare
- Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
- Information and Communications Security : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
- Information and communications protection
- Information assurance : security in the information environment
- Information assurance : trends in vulnerabilities, threats, and technologies
- Information assurance and computer security
- Information disparity : research and measurement challenges in an interconnected world
- Information governance and assurance : reducing risk, promoting policy
- Information governance and security : protecting and managing your company's proprietary information
- Information hiding and applications
- Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
- Information privacy engineering and privacy by design : understanding privacy threats, technology, and regulations based on standards and best practices
- Information privacy engineering and privacy by design : understanding privacy threats, technology, and regulations based on standards and best practices
- Information protection playbook
- Information security : a manager's guide to thwarting data thieves and hackers
- Information security : a manager's guide to thwarting data thieves and hackers
- Information security : opportunities exist for the Federal Housing Finance Agency to improve controls : report to the Acting Director of the Federal Housing Finance Agency
- Information security : policy, processes, and practices
- Information security : principles and practices
- Information security fundamentals
- Information security governance
- Information security management : concepts and practice
- Information security management handbook, Volume 6
- Information security management metrics : a definitive guide to effective security monitoring and measurement
- Information security management principles
- Information security management principles : an ISEB certificate
- Information security policies, procedures, and standards : a practitioner's reference
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
- Information storage and management : storing, managing, and protecting digital information
- Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments
- Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments
- Information theft prevention : theory and practice
- Information warfare
- Infosecurity 2008 threat analysis
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
- Integrated Security Systems Design, 2nd Edition
- Intelligent Computing Methodologies : 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III
- Intelligent Computing Theories and Application : 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part II
- Intelligent Data Processing : 11th International Conference, IDP 2016, Barcelona, Spain, October 10-14, 2016, Revised Selected Papers
- Intelligent Information Processing IX : 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings
- Intelligent Mechanisms for Network Configuration and Security : 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings
- Intelligent multimedia data hiding : new directions
- Intelligent watermarking techniques
- Interactive Theorem Proving : 4th International Conference, ITP 2013, Rennes, France, July 22-26, 2013. Proceedings
- Interactive Theorem Proving : 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings
- Interactive Theorem Proving : 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings
- Internet and Distributed Computing Systems : 11th International Conference, IDCS 2018, Tokyo, Japan, October 11?13, 2018, Proceedings
- Internet and surveillance : the challenges of Web 2.0 and social media
- Introduction to Computer and Network Security : Navigating Shades of Gray
- Introduction to Hadoop security : a hands-on approach to securing big data clusters
- Introduction to computer and network security : navigating shades of gray
- Introduction to cyber-warfare : a multidisciplinary approach
- Introduction to cyber-warfare : a multidisciplinary approach
- Introduction to hardware security and trust
- Introduction to information security : LiveLessons (Sneak Peek Video Training)
- Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets
- Investigating the Cyber Breach : the digital forensics guide for the network engineer
- IoT as a Service : Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20?22, 2017, Proceedings
- Karma-based API on Apple platforms : building privacy into iOS and macOS apps
- Key capabilities of an electronic health record system : letter report
- Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimization
- Learning-based VANET Communication and Security Techniques
- Lessons Learned : How to protect critical information infrastructure
- Lightweight Cryptography for Security and Privacy : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
- Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
- Location Privacy in Mobile Applications
- Location privacy protection in mobile networks
- Machine Learning and Knowledge Discovery in Databases : European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part I
- Machine Learning and Knowledge Discovery in Databases : European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part II
- Machine Learning in Cyber Trust : Security, Privacy, and Reliability
- Malicious Attack Propagation and Source Identification
- Malicious cryptography : exposing cryptovirology
- Malicious cryptography : exposing cryptovirology
- Managing Information Security Breaches : Studies from Real Life
- Managing SQL Server encryption certificates : getting started with SQL Server encryption
- Managing catastrophic loss of sensitive data
- Mapping security : the corporate security sourcebook for today's global economy
- Marketing your mobile app : get it right from the start
- Markets for cybercrime tools and stolen data : hackers' bazaar
- Mastering Active Directory - Second Edition
- Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
- Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
- Mastering Python forensics : master the art of digital forensics and analysis with Python
- Mastering System Center Data Protection Manager 2007
- Measuring and managing information risk : a FAIR approach
- Microsoft Data Protection Manager 2010
- Microsoft Enterprise Mobility and Security training
- Mobile Computing, Applications, and Services : 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14-15, 2019, Proceedings
- Mobile Internet Security : 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers
- Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers
- Mobile authentication : problems and solutions
- Mobile data loss : threats and countermeasures
- Mobile device security for dummies
- Mobile phone security and forensics : a practical approach
- Mobility Data Management and Exploration
- Modeling Decisions for Artificial Intelligence : 15th International Conference, MDAI 2018, Mallorca, Spain, October 15?18, 2018, Proceedings
- Modern defense in depth : an integrated approach to better web application security
- Monitoring and Securing Virtualized Networks and Services : 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings
- Multi-Agent Systems and Agreement Technologies : 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers
- Multi-domain master data management : advanced MDM and data governance in practice
- Net privacy : how we can be free in an age of surveillance
- Net privacy : how we can be free in an age of surveillance
- Netcat power tools
- Network Computing and Information Security : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
- Network Hardening : An Automated Approach to Improving Network Security
- Network Intrusion Detection using Deep Learning : A Feature Learning Approach
- Network and System Security : 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
- Network and System Security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
- Network and System Security : 8th International Conference, NSS 2014, Xi?an, China, October 15-17, 2014, Proceedings
- Network infrastructure security
- Nine steps to success : an ISO 27001 implementation overview
- Nine steps to success : an ISO27001:2013 implementation overview
- OAuth 2 in action
- OPTIMAL SPENDING ON CYBERSECURITY MEASURES : risk management
- Of Privacy and Power : The Transatlantic Struggle over Freedom and Security
- On the Move to Meaningful Internet Systems. OTM 2018 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I
- On the Move to Meaningful Internet Systems: OTM 2009 : Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I
- Once more unto the breach : managing information security in an uncertain world
- Oracle Data Guard 11gR2 Administration Beginner's Guide : Learn How to Build and Maintain Data Guard Configurations with Real-Life, Practical Examples
- Oracle data guard 11g handbook
- Overview of computer security certification and accreditation
- PCI DSS 3. 1 : the Standard That Killed SSL
- PCI DSS 3.1 : the standard that killed SSL
- Pairing-Based Cryptography - Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
- Pairing-Based Cryptography - Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
- Passive and Active Measurement : 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings
- Passive and Active Measurement : 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings
- Passive and Active Measurement : 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings
- Pattern and Security Requirements : Engineering-Based Establishment of Security Standards