Results
|
321.
|
|
Image from Amazon.com
|
|
|
322.
|
|
Image from Amazon.com
|
|
|
323.
|
|
Image from Amazon.com
|
|
|
324.
|
|
Image from Amazon.com
|
|
|
325.
|
|
Image from Amazon.com
|
Information Security [electronic resource] : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings / edited by Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee. by Series: Lecture Notes in Computer Science ; 5222Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
326.
|
|
Image from Amazon.com
|
|
|
327.
|
|
Image from Amazon.com
|
|
|
328.
|
|
Image from Amazon.com
|
Recent Advances in Intrusion Detection [electronic resource] : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings / edited by Richard Lippmann, Engin Kirda, Ari Trachtenberg. by Series: Lecture Notes in Computer Science ; 5230Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
329.
|
|
Image from Amazon.com
|
|
|
330.
|
|
Image from Amazon.com
|
Network and Parallel Computing [electronic resource] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen. by Series: Lecture Notes in Computer Science ; 5245Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
331.
|
|
Image from Amazon.com
|
|
|
332.
|
|
Image from Amazon.com
|
Research in Cryptology [electronic resource] : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers / edited by Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf. by Series: Lecture Notes in Computer Science ; 4945Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
333.
|
|
Image from Amazon.com
|
|
|
334.
|
|
Image from Amazon.com
|
|
|
335.
|
|
Image from Amazon.com
|
Provable Security [electronic resource] : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings / edited by Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai. by Series: Lecture Notes in Computer Science ; 5324Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
336.
|
|
Image from Amazon.com
|
Information Hiding [electronic resource] : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / edited by Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow. by Series: Lecture Notes in Computer Science ; 5284Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
337.
|
|
Image from Amazon.com
|
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks [electronic resource] : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers / edited by Henning Schulzrinne, Radu State, Saverio Niccolini. by Series: Lecture Notes in Computer Science ; 5310Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
338.
|
|
Image from Amazon.com
|
|
|
339.
|
|
Image from Amazon.com
|
|
|
340.
|
|
Image from Amazon.com
|
|