Computer Network Security [electronic resource] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin.
Material type:
Computer fileSeries: Lecture Notes in Computer Science ; 3685Publication details: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2005.Description: v.: digitalISBN: - 9783540319986
- Computer science
- Computer Communication Networks
- Operating systems (Computers)
- Data encryption (Computer science)
- Computer software
- Information Systems
- Computer Science
- Computer Communication Networks
- Data Encryption
- Algorithm Analysis and Problem Complexity
- Management of Computing and Information Systems
- Computers and Society
- Operating Systems
- QA76.9.A25 G67 2005
| Item type | Current library | Call number | URL | Copy number | Status | Notes | Barcode | |
|---|---|---|---|---|---|---|---|---|
Libro Electrónico
|
Biblioteca Digital Colección Digital | QA76.9.A25 G67 2005 (Browse shelf(Opens below)) | Link to resource | 1 | Available | Springer Link | BDIG00012332 |
Browsing Biblioteca Digital shelves, Shelving location: Colección Digital Close shelf browser (Hides shelf browser)
| QA76.9.A25 F88 2007 Fifth World Conference on Information Security Education | QA76.9.A25 G35 2008 Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings / | QA76.9.A25 G55 2005 Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers / | QA76.9.A25 G67 2005 Computer Network Security | QA76.9.A25 G67 2007 Computer Network Security | QA76.9.A25 H36 2005 Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers / | QA76.9.A25 H36 2007 Detection of Intrusions and Malware, and Vulnerability Assessment |
There are no comments on this title.
Log in to your account to post a comment.