Filter
Informationsteori
Filter
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the …
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive …
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, …
Semantic Issues in e-Commerce Systems comprises the proceedings of the Ninth Working Conference on Database Semantics, which was sponsored by the International Federation for …
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of …
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable …
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD …
Given the pervasive nature of information technology and information systems in the modern world, the design and development of IS and IT are critical issues of concern. New …
In the mathematical treatment of many problems which arise in physics, economics, engineering, management, etc., the researcher frequently faces two major difficulties: infinite …
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to …