(0 Item)

Internet Security - Documentation & Proceedings

> Conference documentation, webinars & Proceedings

The 10th European Conference on Information Warfare and Security

The Conference on Information Warfare and Information Security illustrated the depth of the information operations’ research area, with the subject matter ranging from the highly technical to the more strategic visions of the use and influence of information.

By : Academic Conferences Limited
Product Type : Academic Proceedings
2nd International Conference on Information Management and Evaluation

ICIME aims to bring together individuals researching and working in the broad field of information management, including information technology evaluation.

By : Academic Conferences Limited
Product Type : Academic Proceedings
6th International Conference on Information Warfare and Security

The topics covered by the papers illustrate the depth of the information operations’ research area, with the subject matter ranging from the highly technical to the more strategic visions of the use and influence of information.

By : Academic Conferences Limited
Product Type : Academic Proceedings
Computation of the Capacity for Discrete Memoryless Channels and Sum Capacity of Multiple Access
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
Similarity Measure using Lossy Compression and its Application to Image Retrieval
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
Formulation of an Information Security Audit Process Model Applicable to Educational Institution
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
UWB Channel Model for Extremely Short Distance Communications Using in 3-D Integration
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
Multiple Access Relay Channel with Orthogonal Components
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
MALURLs: Malicious URLs Classification System
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
Data Compression and Source Coding
Information Theory and Applications (ITA 2011)

This conference provides presented recent advances, research and new techniques in information theory and its applications.

By : Various
Product Type : Academic Conferences
IT Security Governance (ITSG) in Australian Context
Information Technology Security (ITS 2010)

This conference focused on IT security. Why companies despite the budget cuts don't compromise it? How do you to keep the stability and security of the company software?

By : Various
Product Type : Academic Conferences
Network Security: Contents, delivery and assessemnts of an undergraduate subject
Information Technology Security (ITS 2010)

This conference focused on IT security. Why companies despite the budget cuts don't compromise it? How do you to keep the stability and security of the company software?

By : Tanveer A Zia
Product Type : Academic Conferences
Do you see or hear first: The case for perception simultaneity as a quality measure for...
Information Technology Security (ITS 2010)

This conference focused on IT security. Why companies despite the budget cuts don't compromise it? How do you to keep the stability and security of the company software?

By : Various
Product Type : Academic Conferences
A Proposed Implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) in Global Smart
Information Technology Security (ITS 2010)

This conference focused on IT security. Why companies despite the budget cuts don't compromise it? How do you to keep the stability and security of the company software?

By : Various
Product Type : Academic Conferences
Mutual Authentication with Malware Protection for a RFID System
Information Technology Security (ITS 2010)

This conference focused on IT security. Why companies despite the budget cuts don't compromise it? How do you to keep the stability and security of the company software?

By : Various
Product Type : Academic Conferences