Skip to contents

  1. Hoopes, John [Editor]; Bawcom, Aaron [Other]

    Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ; [the only book on all the security applications made possible by virtualization ; comprehensive coverage of the many uses of virtualization technology for an enhanced security posture ; broad technique-based approach useful for every security professional, from administrators and researchers to consultants and forensic investigators ; covers many virtualization options, including choosing the right solution for the task, configuration, and use in dual booting, training and protection]

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress Publ., 2009

  2. Mangard, Stefan [Editor]; Standaert, Francois-Xavier [Other] ; International Association for Cryptologic Research, CHES 12 2010 Santa Barbara, Calif

    Cryptographic hardware and embedded systems - CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20,2010 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2010

    Published in: Lecture notes in computer science ; 6225

  3. Finch, James H. [Editor]; Dougall, E. Graham [Other] ; International Federation for Information Processing, International Conference on Computer Security 2 1984 Toronto

    Computer security : a global challenge ; proceedings of the second International Conference on Computer Security, IFIP/Sec8́4, Toronto, Ontario, Canada, 10-12 September, 1984

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Amsterdam [u.a.]: North-Holland, 1984

    Published in: Proceedings of the IFIP international conference on computer security ; 2

  4. Denko, Mieso K. [Editor]; Shih, Chi-Sheng [Other]; Li, Kuan-Ching [Other]; Tsao, Shiao-Li [Other]; Zeng, Qing-An [Other]; Park, Soo-Hyun [Other]; Ko, Young-Bae [Other]; Hung, Shih-Hao [Other]; Park, Jong Hyuk [Other] ; EUC 2007 Taipeh

    Emerging directions in embedded and ubiquitous computing : EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2007

    Published in: Lecture notes in computer science ; 4809

  5. Sauveron, Damien [Editor]; Markantonakis, Konstantinos [Other] ; International Federation for Information Processing Technical Committee Communication Systems, International Federation for Information Processing Working Group Smart Cards, International Federation for Information Processing Working Group Information Security Management & Small Systems Security, WISTP 1 2007 Heraklion

    Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; first IFIP TC6/WG 8.8/WG 11.2 international workshop, WISTP 2007, Heraklion, Crete, Greece, May 9 - 11, 2007 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2007

    Published in: Lecture notes in computer science ; 4462