61
Cryptographic hardware and embedded systems [E-Book] : CHES 2008 - 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings /
62
Information theoretic security [E-Book] : third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings /
63
Advances in cryptology [E-Book] : CRYPTO 2008 - 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008 : proceedings /
64
Security and cryptography [E-Book] : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings /
65
Recent advances in intrusion detection [E-Book] : 11th international symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008 : proceedings /
66
Advances in cryptology [E-Book] : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, ASIACRYPT 2008 : proceedings /
67
Information systems security [E-Book] : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings /
68
Computer safety, reliability, and security [E-Book] : 27th international conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 : proceedings /
69
Information hiding [E-Book] : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
70
Advances in information and computer security [E-Book] : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings /
71
Cryptology and network security [E-Book] : 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 : proceedings /
72
Nagios : System- und Netzwerk-Monitoring /
Book
...DZE - Data privacy, data security...
Table of Contents 
73
IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz : der Weg zur Zertifizierung /
Book
...DZE - Data privacy, data security...
Table of Contents 
74
PHP-Sicherheit : PHP/MySQL-Webanwendungen sicher programmieren /
Book
...DZE - Data privacy, data security...
75
Die Kunst des Einbruchs : Risikofaktor IT /
Book
...DZE - Data privacy, data security...
Table of Contents 
76
Hacking : the art of exploitation /
Book
...DZE - Data privacy, data security...
Table of Contents 
77
Finite automata and application to cryptography /
Book
Tao, Renji
2008
...DZE - Data privacy, data security...
Table of Contents 
78
Security engineering : a guide to building dependable distributed systems /
Book
...DZE - Data privacy, data security...
Table of Contents 
79
www.InfrastrukturInternet-Cyberterror.Netzwerk : Analyse und Simulation strategischer Angriffe auf die kritische Infrastruktur Internet [E-Book] /
80
www.InfrastrukturInternet-Cyberterror.Netzwerk : Analyse und Simulation strategischer Angriffe auf die kritische Infrastruktur Internet /
Book