Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Computer security
- Source
- cct
109 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007 : proceedings
- Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings
- Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings
- Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings
- Autonomic and trusted computing : third international conference, ATC 2006, Wuhan, China, September 3-6, 2006 : proceedings
- Biometrics, computer security systems and artificial intelligence applications
- Botnet detection : countering the largest security threat
- Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
- Communications and multimedia security : 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006 : proceedings
- Communications and multimedia security : 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 ; proceedings
- Communications and multimedia security : 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the Lake District, United Kingdom
- Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006 : revised selected papers
- Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
- Computer safety, reliability, and security : 27th international conference, SAFECOMP 2008, Newcastle on Tyne, UK, September 22-25, 2008 : proceedings
- Critical information infrastructures : resilience and protection
- Critical infrastructure protection
- Cryptography in C and C++
- Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings
- Cyberspace security and defense : research issues
- Decrypted secrets : methods and maxims of cryptology
- Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings
- Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings
- E-voting and identity : first international conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007 : revised selected papers
- Electronic postage systems : technology, security, economics
- Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 : proceedings
- Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers
- Financial cryptography and data security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers
- Formal aspects in security and trust : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers
- Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers
- Formal aspects in security and trust : IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France
- Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers
- Foundations of computer security
- Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures
- Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings
- Grid computing security
- Hop integrity in the Internet
- Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers
- Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings
- Information assurance : security in the information environment
- Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
- Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings
- Information security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
- Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings
- Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers
- Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers
- Information security and cryptology : second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings
- Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers
- Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
- Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings
- Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings
- Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 ; proceedings
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- Insider attack and cyber security : beyond the hacker
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings
- Inter-domain management : First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings
- Introduction to cryptography : principles and applications
- Intrusion detection and correlation : challenges and solutions
- Machine learning and data mining for computer security : methods and applications
- Managing cyber threats : issues, approaches, and challenges
- Mobile device security for dummies
- New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
- Open source systems security certification
- Pairing-based cryptography - Pairing 2009 : Third International Conference, Palo Alto, CA, USA, August 12-14, 2009 : proceedings
- Pairing-based cryptography--Pairing 2010 : 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings
- Primality testing and integer factorization in public-key cryptography
- Privacy enhancing technologies : 4th international workshop, PET 2004, Toronto, Canada, May 26-28, 2004 : revised selected papers
- Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers
- Privacy enhancing technologies : 6th international workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers
- Privacy, security, and trust within the context of pervasive computing
- Privacy-preserving data mining : models and algorithms
- Privacy-respecting intrusion detection
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Progress in cryptology--LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings
- Protecting persons while protecting the people : second annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008, revised selected papers
- Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
- Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
- Public key cryptography-- PKC 2006 : 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings
- Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
- Recent advances in intrusion detection : 9th international symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006 : proceedings
- Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
- Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : proceedings
- Secure data management : third VLDB workshop, SDM 2006, Seoul, Korea, September 10-11, 2006 ; proceedings
- Secure data management in decentralized systems
- Secure group communications over data networks
- Secure systems development with UML
- Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
- Security and privacy in ad-hoc and sensor networks : third European Workshop, ESAS 2006, Hamburg, Germany, Setpember 20-21, 2006 : revised selected papers
- Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
- Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan
- Security engineering for service-oriented architectures
- Security protocols : 12th international workshop, Cambridge, UK, April 26-28, 2004 : revised selected papers
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 14th international workshop, Cambridge, March 27-29 2006, revised selected papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Smart cards, tokens, security and applications
- Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007 : proceedings
- Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings
- Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
- Transactions on computational science IV : special issue on security in computing
- Trust management : proceedings of IFIPTM 2007, Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada
- Trust, privacy, and security in digital business : third international conference, TrustBus 2006, Kraków, Poland, September 2006 : proceedings
- Trusted computing : Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings
- Trusted computing platforms : design and applications
- Trustworthy global computing : 4th international symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008 ; revised selected papers
- Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers
- Understanding intrusion detection through visualization
- Vulnerability analysis and defense for the Internet
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/ghKhFEwqTmw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/ghKhFEwqTmw/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/ghKhFEwqTmw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/ghKhFEwqTmw/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>