Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014.
English | Jan 28, 2015 | ISBN: 3319150863 | ISBN-13: 978-3319150864 | 406 Pages | PDF | 40 MB
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.
Download:
http://longfiles.com/1smh3eeodml3/Information_Security_Applications_15th_International_Workshop-_WISA_2014-_Jeju_Island-_Korea-_August_25-27-_2014.pdf.html
Cybersecurity Lexicon
Statistical Methods in Counterterrorism
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
Foundations and Practice of Security
The Values-based Safety Process
Microsoft Vista for IT Security Professionals
Cyber Security: An Introduction for Non-Technical Managers
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide (Certification Press) by John Ch
Computer Viruses: from theory to applications (Collection IRIS)
"Theory and Practice of Cryptography and Network Security Protocols and Technologies" ed. by Jaydip
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Malware, Rootkits & Botnets A Beginner's G(2213)
The Dark Net Searching: how to search anon(2132)
Tor and The Dark Net: Remain Anonymous Onl(1978)
Tor Browser: The Ultimate Guide To The Tor(1953)
Hacking Made Easy: Hack Your Way Through L(1887)
Cybersecurity for Beginners(1690)
Hacking Google Maps and Google Earth(1676)
Hacking For Dummies(1520)
Computer Virus: Introducing... Computer Vi(1508)
Penetration Testing with Raspberry Pi(1495)
The Artificial Intelligence Conspiracy: Ho(1483)
Principles of Computer Security Lab Manual(1467)
Understanding SSL: Securing Your Website T(1449)
Cyber Security Basics: Protect your organi(1416)
Learning Network Forensics(1413)
