Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)
  Security and Protection (K.6.5) See Reviews  
Subject Descriptors:
Authentication (92)
Invasive Software (59)
Physical Security (2)
Unauthorized Access (115)
Proper Nouns:
There are no proper nouns with reviews under K.6.5.
Reviews limited to:

Reviews about "Security and Protection (K.6.5)":
Advanced persistent security
Winkler I., Gomes A.,  Syngress Publishing, Cambridge, MA, 2017.Type: Book (9780128093160)
Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N.  UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii,  Sep 11-15, 2017) 37-40, 2017. Type: Proceedings
Biometrics in a data driven world: trends, technologies, and challenges
Mitra S., Gofman M.,  Chapman & Hall/CRC, Boca Raton, FL, 2017. 426 pp. Type: Book (978-1-498737-64-7)
Cyber security engineering: a practical approach for systems and software assurance
Mead N., Woody C.,  Addison Wesley Professional, Boston, MA, 2017. 384 pp. Type: Book (0134189809)
A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S.  ACM Computing Surveys 49(4): 1-35, 2017. Type: Article
Cyber deception: building the scientific foundation
Jajodia S., Subrahmanian V., Swarup V., Wang C.,  Springer International Publishing, New York, NY, 2016. 314 pp. Type: Book (978-3-319326-97-9)
The quest to cyber superiority: cybersecurity regulations, frameworks, and strategies of major economies
Kshetri N.,  Springer International Publishing, New York, NY, 2016. 240 pp. Type: Book (978-3-319405-53-7)
Related Topics
K.6.5 Security and Protection
  - Social Issues
  - Security and Protection
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy