Some security trends over wireless sensor networks
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Lightweight mix columns implementation for AES
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A channel coding approach for human authentication from gait sequences
IEEE Transactions on Information Forensics and Security
Implementation of H.264 transcoding & selective encryption of bit stream
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Biometric template protection in multimodal authentication systems based on error correcting codes
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
AES and confidentiality from the inside out
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Towards a secure Frequency Monitoring NETwork (FNET) system
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A calculus for the qualitative risk assessment of policy override authorization
Proceedings of the 3rd international conference on Security of information and networks
Network firewall visualization in the classroom
Journal of Computing Sciences in Colleges
UPBOT: a testbed for cyber-physical systems
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
Review: Multi-agent systems for protecting critical infrastructures: A survey
Journal of Network and Computer Applications
Architecture-Independent dynamic information flow tracking
CC'13 Proceedings of the 22nd international conference on Compiler Construction
Developing an iPhone app for a more safe and secure encrypted conversation/text/chat
Journal of Computing Sciences in Colleges
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.00 |
For courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically -- and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association have named Computer Security: Principles and Practice the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008. Visit Stallings Companion Website at http://williamstallings.com/CompSec/CompSec1e.html for student and instructor resources and his Computer Science Student Resource site http://williamstallings.com/StudentSupport.html Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required) Supplements Include: *Power Point Lecture Slides*Instructor's Manual*Author maintained website .