Information security in the business setting has matured in the last few decades. Standards, such...
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insid...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information S...
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Worksho...
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Comp...
TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on ...
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology ...
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems...
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop o...
This book constitutes the refereed proceedings of the 15th International Conference on Informatio...
Foreword from the Program Chairs These proceedings contain the papers selected for presentation a...
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd Eu...