1
Mathematics and Computation in Music [E-Book] : First International Conference, MCM 2007 Berlin, Germany, May 18–20, 2007 Revised Selected Papers /
2
E-business and Telecommunications [E-Book] : 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /
3
Policies and Research in Identity Management [E-Book] : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 /
4
VizSEC 2007 [E-Book] : Proceedings of the Workshop on Visualization for Computer Security /
5
Making Grids Work [E-Book] : Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece /
6
Data Warehousing and Data Mining Techniques for Cyber Security [E-Book] /
7
STACS 2007 [E-Book] : 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007. Proceedings /
8
Security for Wireless Sensor Networks [E-Book] /
9
Practical Internet Security [E-Book] /
10
Elektronische Signaturen in modernen Geschäftsprozessen [E-Book] : Schlanke und effiziente Prozesse mit der eigenhändigen elektronischen Unterschrift realisieren /
11
Online Business Security Systems [E-Book] /
12
Exploratory Data Analysis Using Fisher Information [E-Book] /
13
Formal Correctness of Security Protocols [E-Book] : With 62 Figures and 4 Tables /
14
Integrated Research in GRID Computing [E-Book] : CoreGRID Integration Workshop 2005 (Selected Papers) November 28–30, Pisa, Italy /
15
Knowledge and Data Management in GRIDs [E-Book] /
16
Synchronizing Internet Protocol Security (SIPSec) [E-Book] /
17
Preserving Privacy in On-Line Analytical Processing (OLAP) [E-Book] /
18
ISSE/SECURE 2007 Securing Electronic Business Processes [E-Book] : Highlights of the Information Security Solutions Europe/SECURE 2007 Conference /
19
Network Security Policies and Procedures [E-Book] /
20
Privacy-Respecting Intrusion Detection [E-Book] /