Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Computer networks -- Security measures
- Source
- cct
56 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- A guide to computer network security
- Access control systems : security, identity management and trust models
- Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings
- Autonomic and trusted computing : third international conference, ATC 2006, Wuhan, China, September 3-6, 2006 : proceedings
- Botnet detection : countering the largest security threat
- Communications and multimedia security : 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006 : proceedings
- Communications and multimedia security : 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the Lake District, United Kingdom
- Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
- Computer viruses and malware
- Critical infrastructure protection
- Cryptology and network security : 5th international conference, CANS 2006 Suzhou, China, December 2006 : proceedings
- Cryptology and network security : 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 : proceedings
- Cyberspace security and defense : research issues
- Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
- Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings
- EC2ND 2005 : proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK
- Embedded Java security : security for mobile devices
- Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
- Formal aspects in security and trust : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers
- Formal correctness of security protocols
- Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures
- Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings
- Handbook of database security : applications and trends
- INetSec 2009 - Open Research Problems in Network Security : IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009 : revised selected papers
- Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)
- Information processing and security systems
- Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers
- Information security governance
- Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings
- Insider attack and cyber security : beyond the hacker
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings
- Introduction to cryptography : principles and applications
- Intrusion detection and correlation : challenges and solutions
- Managing cyber threats : issues, approaches, and challenges
- Network control and engineering for QoS, security and mobility, IV : Fourth IFIP International Conference on Network Control and Engineering for QoS. Security, and Mobility, Lannion, France, November 14-18, 2005
- Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
- Network control and engineering for QoS, security, and mobility, III
- New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
- Policies and research in identity management : second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings
- Practical Internet security
- Privacy enhancing technologies : 4th international workshop, PET 2004, Toronto, Canada, May 26-28, 2004 : revised selected papers
- Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers
- Privacy enhancing technologies : 6th international workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers
- Public key infrastructure : 4th European PKI Workshop : theory and practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007 : proceedings
- Public key infrastructure : Third European PKI Workshop : theory and practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006 : proceedings
- Public key infrastructures, services and applications : 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers
- Secure data management in decentralized systems
- Secure group communications over data networks
- Secure mobile ad-hoc networks and sensors : first international workshop, MADNES 2005, Singapore, September 20-22, 2005 : revised selected papers
- Security and Privacy in Communication Networks : 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
- Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers
- Security and privacy in ad-hoc and sensor networks : third European Workshop, ESAS 2006, Hamburg, Germany, Setpember 20-21, 2006 : revised selected papers
- Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan
- Trustworthy global computing : 4th international symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008 ; revised selected papers
- Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers
- Understanding intrusion detection through visualization
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/YgTBsLWZiC8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/YgTBsLWZiC8/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/YgTBsLWZiC8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/YgTBsLWZiC8/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>