1. Advances in cryptology -- ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings /: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Part III : (2017) Editors: (Mathematician), Takagi, Tsuyoshi; Peyrin, Thomas Other Names: International Conference on the Theory and Application of Cryptology and Information Security, 23rd Record Type: Book Extent: 1 online resource (xviii, 473 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Guide to digital forensics : a concise and practical introduction /: a concise and practical introduction. (2017) Authors: Kävrestad, Joakim Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Provable security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, proceedings /: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, proceedings. (2016) Editors: Chen, Liqun; Han, Jinguang Other Names: ProvSec (Conference), 10th Record Type: Book Extent: 1 online resource (XIII, 394 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings /: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings. ([2016]) Editors: Lam, Kwok-Yan; Chi, Chi-Hung; Qing, Sihan Other Names: ICICS (Conference), 18th Record Type: Book Extent: 1 online resource (XII, 478 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Cyber denial, deception and counter deception : a framework for supporting active cyber defense /: a framework for supporting active cyber defense. (2015) Authors: Heckman, Kristin E; Stech, Frank J; Thomas, Roshan K; Schmoker, Ben; Tsow, Alexander W Record Type: Book Extent: 1 online resource (xv, 251 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers. ([2017]) Editors: Guilley, Sylvain Other Names: COSADE (Workshop), 8th Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Trust and trustworthy computing : 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. (2015) Editors: Conti, Mauro; Schunter, Matthias; Askoxylakis, Ioannis Other Names: TRUST (Conference), 8th Record Type: Book Extent: 1 online resource (xi, 328 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Theory of cryptography. 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings /: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings. Part I : (2017) Editors: Kalai, Yael; Reyzin, Leonid Other Names: Theory of Cryptography Conference, 15th Record Type: Book Extent: 1 online resource (xvii, 812 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Cloud computing and security. third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised selected papers /: third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised selected papers. Part I : (2017) Editors: Sun, Xingming; Chao, Han-Chieh; You, Xingang; Bertino, Elisa Other Names: ICCCS (Conference), 3rd Record Type: Book Extent: 1 online resource (xxi, 565 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Ten laws for security. (2016) Authors: Diehl, Eric Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗