Computer Security
Resource Information
The concept Computer Security represents the subject, aboutness, idea or notion of resources found in University of Missouri-St. Louis Libraries.
The Resource
Computer Security
Resource Information
The concept Computer Security represents the subject, aboutness, idea or notion of resources found in University of Missouri-St. Louis Libraries.
- Label
- Computer Security
238 Items that share the Concept Computer Security
Context
Context of Computer SecuritySubject of
No resources found
No enriched resources found
- 10th Enabling Technologies Workshop : Infrastructure for Collaborative Enterprises: (WET ICE 2001): Proceedings of the IEEE International Workshops: Infrastructure for Collaborative Enterprises 2001: Cambridge, MA
- 11th IEEE Computer Security Foundations Workshop (CSFW '98)
- 11th IEEE International Workshops on Enabling Technologies (WET-ICE 2002) : Infrastructure for Collaborative Enterprises
- 16th Annual Computer Security Applications Conference (ACSAC '00)
- 18th Annual Computer Security Applications Conference (ACSAC 2002)
- 1994 ACM SIGSAC New Security Paradigms Workshop : proceedings, August 3-5, 1994, Little Compton, Rhode Island
- 1997 31st Annual International Carnahan Conference on Security Technology
- 19th Annual Computer Security Applications Conference (ACSAC 2003)
- 19th IEEE Computer Security Foundations Workshop (CSFW 2006) : 05-07 July 2006/Venice, Italy
- 2000 34th Annual IEEE International Carnahan Conference on Security Technology
- 2002 IEEE Symposium on Security and Privacy (S&P 2002)
- 2004 38th Annual International Carnahan Conference on Security Technology
- 2005 IEEE International Carnahan Conference on Security Technology
- 2005 IEEE Workshop on Information Assurance and Security
- 2006 IEEE Carnahan Conference on Security Technology
- 2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety
- 2007 IEEE Intelligence and Security Informatics
- 2007 International Carnahan Conference on Security Technology
- 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
- 2013 Third Workshop on Socio Technical Aspects in Security and Trust (STAST)
- 2013 World Congress on Internet Security (WorldCIS)
- 2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)
- 2014 6Th International Conference in Cyber Conflict Proceedings (Cycon)
- 2014 Eighth International Conference on Software Security and Reliability (SERE)
- 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)
- 2014 IEEE 27th Computer Security Foundations Symposium (CSF)
- 2014 IEEE Conference on Communications and Network Security
- 2014 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC)
- 2014 IEEE Security and Privacy Workshops (SPW)
- 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
- 2014 IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments (CIDUE)
- 2014 Ieee Eighth International Conference on Software Security and Reliability Companion (Sere C)
- 2014 International Conference on Computer and Information Sciences (ICCOINS)
- 2014 International Conference on Trustworthy Systems and Their Applications (TSA)
- 2014 Ninth International Conference on Availability, Reliability and Security (ARES)
- 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH MSP)
- 2014 Twelfth Annual International Conference on Privacy, Security and Trust (Pst)
- 2014 Workshop on Socio Technical Aspects in Security and Trust (STAST)
- 2015 10th Asia Joint Conference on Information Security (AsiaJCIS)
- 2015 10th International Conference on Availability, Reliability and Security (ARES)
- 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
- 2015 13th Annual Conference on Privacy, Security and Trust (PST)
- 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
- 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE)
- 2015 5th International Conference on IT Convergence and Security (ICITCS)
- 2015 Conference on Information Assurance and Cyber Security (CIACS)
- 2015 European Intelligence and Security Informatics Conference (EISIC)
- 2015 IEEE 28th Computer Security Foundations Symposium (CSF)
- 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)
- 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
- 2015 IEEE ACM 3rd International Workshop on Software Engineering for Systems of Systems (SESoS)
- 2015 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)
- 2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
- 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2015 IEEE International Workshop on Information Forensics and Security (WIFS)
- 2015 IEEE Security and Privacy Workshops (SPW)
- 2015 IEEE Symposium on Security and Privacy (SP)
- 2015 IEEE Symposium on Visualization for Cyber Security (VizSec)
- 2015 IEEE Trustcom BigDataSE I SPA
- 2015 Information Security for South Africa (ISSA)
- 2015 International Carnahan Conference on Security Technology (ICCST)
- 2015 International Conference on Computer, Communications, and Control Technology (I4CT)
- 2015 International Conference on Computer, Information and Telecommunication Systems (CITS)
- 2015 International Conference on Computing, Communication and Security (ICCCS)
- 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
- 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH MSP)
- 2015 International Siberian Conference on Control and Communications (SIBCON)
- 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
- 2015 Sixth International Conference on Emerging Security Technologies (EST)
- 2015 Workshop on Socio Technical Aspects in Security and Trust (STAST)
- 2015 World Congress on Internet Security (WorldCIS)
- 2015 World Symposium on Computer Networks and Information Security (WSCNIS)
- 2016 11th International Symposium on Reconfigurable Communication Centric Systems on Chip (ReCoSoC)
- 2016 12th International Conference on Computational Intelligence and Security (CIS)
- 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
- 2016 4th International Symposium on Digital Forensic and Security (ISDFS)
- 2016 6th International Conference on IT Convergence and Security (ICITCS)
- 2016 8th International Conference on Cyber Conflict (CyCon)
- 2016 IEEE 29th Computer Security Foundations Symposium (CSF)
- 2016 IEEE International Carnahan Conference on Security Technology (ICCST)
- 2016 IEEE International Workshop on Information Forensics and Security (WIFS)
- 2016 IEEE Security and Privacy Workshops (SPW)
- 2016 IEEE Symposium on Visualization for Cyber Security (VizSec)
- 2016 Information Security for South Africa (ISSA)
- 2016 Intl IEEE Conferences on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC ATC ScalCom CBDCom IoP SmartWorld)
- 2016 Smart City Security and Privacy Workshop (SCSP W)
- 2017 12th International Symposium on Reconfigurable Communication Centric Systems on Chip (ReCoSoC)
- 2017 5th International Symposium on Digital Forensic and Security (ISDFS)
- 2017 IEEE 26th International Conference on Enabling Technologies Infrastructure for Collaborative Enterprises (WETICE)
- 2017 IEEE Security and Privacy Workshops (SPW)
- 2017 IEEE Symposium on Visualization for Cyber Security (VizSec)
- 2017 International Conference on Cyber Conflict (CyCon U S )
- 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
- 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)
- 2017 Seventh International Conference on Emerging Security Technologies (EST)
- 20th IEEE Computer Security Foundations Symposium (CSF 2007) : Venice, Italy - 06-08 July 2007
- 21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors
- 2nd Annual ACM Conference on Computer and Communications Security
- A practical guide to managing information security
- ACSAC 2005 : 21st Annual Computer Security Applications Conference (05-09 December 2005/Tucson, AZ)
- Access to online resources : a guide for the modern librarian
- Advances in biometric person authentication : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004 : proceedings
- Analysis, design and implementation of secure and interoperable distributed health information systems
- Analysis, design, and implementation of secure and interoperable distributed health information systems
- At the nexus of cybersecurity and public policy : some basic concepts and issues
- BigNum math : implementing cryptographic multiple precision arithmetic
- Biohackers : the politics of open science
- Biohackers : the politics of open science
- Botnets : the killer web app
- CCS 96 : ACM Conference on Computer and Communications Security
- CCS 98 : 5th ACM Conference on Computer and Communication Security
- CSFW 2005 : 18th IEEE Computer Security Foundations Workshop (20-22 June 2005/Aix-en-Provence, France)
- CSFW-16-2003 Compyter Security Foundations Workshop
- Citrix Access Gateway VPX 5. 04 Essentials
- Cloud computing : assessing the risks
- CompTIA security+ SYO-401 in depth
- Computer Security Application Conference : Proceedings of the Conference Phoenix, Arizona, 1999
- Computer Security Applications Conference : Proceedings: Annual Computer Security Applications Conference (14th: 1998: Phoenix, Arizona)
- Computer Security Applications Conference : Proceedings: Annual Computer Security Applications Conference (20th: 2004: Tucson, AZ)
- Computer Security Applications Conference, 12th Annual
- Computer Security Applications Conference; Proceedings : Annual Computer Security Applications Conference (23d: 2007: Miami Beach, FL)
- Computer Security Applications, 10th Annual Conference
- Computer Security Applications, 5th Annual Conference
- Computer Security Applications, 7th Annual Conference
- Computer Security Applications, 8th Annual Conference
- Computer Security Applications, 9th Annual Conference
- Computer Security Foundations : Proceedings, 17th International Workshop, Pacific Grove, California, 2004
- Computer Security Foundations Workshop (CSFW-15 2002), 15th IEEE
- Computer Security Foundations Workshop : Proceedings of the 12th IEEE Computer Security Foundations Workshop Held in Mordano, Italy, 1999
- Computer Security Foundations Workshop IV
- Computer Security Foundations Workshop IX : CSFW 96
- Computer Security Foundations Workshop V
- Computer Security Foundations Workshop VI
- Computer Security Foundations Workshop VII
- Computer Security Foundations Workshop X : Proceedings of the Tenth Computer Security Foundations Workshop, Rockport, MA, 1997
- Computer and intrusion forensics
- Computers & security
- Confidentiality of electronic health data : methods for protecting personally identifiable information : January 1990 through March 1996 : 448 selected citations
- Configuring NetScreen Firewalls
- Critical Information Infrastructure Protection and the Law : An Overview of Key Issues
- Cyber security and IT infrastructure protection
- Cybersecurity operations handbook
- DARPA Information Survivability Conference and Exposition : Proceedings: DISCEX'00, 25-27 January 2000, Hilton Head, South Carolina
- Data privacy in the information age
- Defense and detection strategies against Internet worms
- Developing a HIPAA compliant EMR system : TigerPlace case study
- Developing secure distributed systems with CORBA
- Dictionary of health information technology and security
- Distributed denial of service attack and defense
- Enabling Technologies (Wet-Ice 2000) : Postproceedings on the 9th International Workshops
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Essential computer security : everyone's guide to e-mail, internet, and wireless security
- FISMA certification & accreditation handbook
- Financial cryptography and data security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers
- Firewall Design and Analysis, Vol. 4
- Firewall policies and VPN configurations
- Firewalls : jumpstart for network and systems administrators
- For the record : protecting electronic health information
- For the record : protecting electronic health information
- Hack Proofing Your Identity In The Information Age
- Hack proofing ColdFusion
- Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one
- Hack proofing Windows 2000
- Hack proofing your Web applications : the only way to stop a hacker is to think like one
- Hacking Android
- Hacking point of sale : payment application secrets, threats, and solutions
- Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012)
- Healthcare fraud : auditing and detection guide
- Healthcare fraud : auditing and detection guide
- How to cheat at managing microsoft operations manager 2005
- IEEE Symposium on Security and Privacy, 2001, Oakland CA
- Information Security Breaches : Avoidance and Treatment Based on ISO27001
- Information Security, Coding Theory and Related Combinatorics : Information Coding and Combinatorics
- Information Survivability Conference and Exposition II (Discex-II 2001), 2001 Darpa
- Information security : policy, processes, and practices
- International Symposium on Data, Privacy, and E-Commerce : 1st: 2007, Chengdu, China
- Investigative data mining for security and criminal detection
- Kali Linux: Windows Penetration Testing
- Let Conference on Crime and Security
- Logics and Languages for Reliability and Security - Volume 25 NATO Science for Peace and Security Series - D : Information and Communication Security
- Managing information security
- Mission-critical network planning
- Modelling cyber security : approaches, methodology, strategies
- NSPW 96 : New Security Paradigms Workshop
- Network and Distributed System Security, 1995 : Symposium
- Network and Distributed System Security, 1997 : Symposium
- Nine steps to success : an ISO 27001 implementation overview
- Perfect passwords : selection, protection, authentication
- Pew Internet & American Life Project : the internet and emergency preparedness
- Physical Security for IT
- Policy issues in data protection and privacy : concepts and perspectives : proceedings of the OECD seminar 24th to 26th June 1974
- Practical guide for implementing secure intranets and extranets
- Privacy protection and computer forensics
- Proceedings : Cybersecurity Applications and Technology Conference for Homeland Security, Washington, D.C. March 3-4, 2009
- Proceedings of the 7th ACM Conference on Computer and Communications Security : CCS 2000: Athens, Greece, November 1-4, 2000
- Programmer's ultimate security deskref
- Psychological information, protecting the right to privacy : a guidebook for mental health practitioners and their clients
- RBAC 95 : 1st ACM Workshop on Role-Based Access Control
- RBAC 97 : RBAC 97: Second ACM Workshop on Role Based Access Control
- Risk management for computer security : Protecting your network and information assets
- Role-based access control
- SP 2005 : 2005 IEEE Symposium on Security and Privacy (08-11 May 2005/Oakland, CA)
- SSCP : study guide and & DVD training system
- Security Fundamentals for E-Commerce
- Security Sage's Guide to Hardening the Network Infrastructure
- Security Technologies for the World Wide Web
- Security and Privacy : 1992 Symposium Reserach In
- Security and Privacy : 1993 Symposium on Research In
- Security and Privacy : 1995 IEEE Symposium on Research in Security
- Security and Privacy : 1996 IEEE Symposium On
- Security and Privacy : Proceedings, IEEE Symposium, Berkeley, CA, 2004
- Security and Privacy : Research in 9̀1 Symposium
- Security and Privacy Symposium 2000 : 2000 IEEE
- Security and Privacy, (Symposium '89)
- Security and Privacy, 1997 : Proceedings, IEEE Symposium on Security and Privacy (1997: Oakland, CA)
- Security and Privacy, 1998 IEEE Symposium On
- Security and Privacy: Proceedings, 1999 : IEEE Symposium on Security and Privacy (1999: Oakland, CA)
- Security assessment : case studies for implementing the NSA lAM
- Security education, awareness, and training : from theory to practice
- Security technologies for the World Wide Web
- Smart card security and applications
- Source Code Analysis and Manipulation : Proceedings of the IEEE International Workshop on Source Code Analysis and Manipulation (1st: 2001: Florence, Italy)
- Stealing The Network : How to Own the Box
- Stealing the network : how to own an identity
- Syngress force emerging threat analysis : from mischief to malicious
- Technology and privacy : the new landscape
- The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers
- The complete guide to Internet security
- The complete guide to healthcare privacy and information security governance
- The e-Privacy Imperative
- The e-policy handbook : designing and implementing effective e-mail, Internet, and software policies
- Trust in cyberspace
- User's guide to cryptography and standards
- WarDriving : drive, detect, defend: a guide to wireless security
- Writing security tools and exploits
- Zabbix Network Monitoring
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/resource/JYRWh5SHxUY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/resource/JYRWh5SHxUY/">Computer Security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer Security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/resource/JYRWh5SHxUY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/resource/JYRWh5SHxUY/">Computer Security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>