-
Routledge handbook of international cybersecurity
Computer security;e-böcker
Tikk-Ringas, Eneken;Kerttunen, Mika - Routledge 2020
-
Rational Cybersecurity for Business : The Security Leaders' Guide to Business Alignment
Data protection;Security
Blum, Dan - Imprint: Apress 2020 1st ed. 2020.
-
Cyber Security : 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers
Computer security;Systems and Data Security
Yun, Xiaochun;Wen, Weiping;Lang, Bo;Yan, Hanbing;Ding, Li;Li, Jia;Zhou, Yu - Imprint: Springer 2019 1st ed. 2019.
-
Introduction to security consulting : a lucrative business service
Business enterprises;Private security services;Security consultants;Security systems;e-böcker
Blake, William F - Charles C Thomas, Publisher, Ltd. 2019
-
Principles of Security and Trust : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April
Computer security;Software engineering;Artificial intelligence;Computer system performance;Computer science;Information theory;Systems and Data Security;Software Engineering/Programming and Operating Systems;System Performance and Evaluation;Computing Milieux;Theory of Computation
Nielson, Flemming;Sands, David - Imprint: Springer 2019 1st ed. 2019.
-
Understanding security issues
Computer networks;Computer security;e-böcker
Donaldson, Scott E;Siegel, Stanley G;Williams, Chris K - Walter de Gruyter Incorporated 2019
-
Cybersecurity law : protect yourself and your customers
Computer security
Brathwaite, Shimon - Business Expert Press 2019
-
2018 Fourth International Conference on Mobile and Secure Services : 24-25 February 2018, Miami Beach, FL, USA
Mobile communication systems
- Institute of Electrical and Electronics Engineers 2018
-
Trusted computing : principles and applications
Information technology
Feng, Dengguo - Tsinghua University Press 2018
-
ISBA : 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis : 11-12 January 2018, Singapore
Biometric identification;Pattern recognition systems
- Institute of Electrical and Electronics Engineers 2018
-
Bitcoin and beyond : cryptocurrencies, blockchains, and global governance
Bitcoin;Electronic funds transfers;Financial institutions;International finance
Campbell-Verduyn, Malcolm - Routledge, Taylor & Francis Group 2018
-
Empirical research for software security : foundations and experience
Computer networks;Computer security
ben Othmane, Lotfi;Jaatun, Martin Gilje;Weippl, Edgar - CRC Press 2018
-
Tyranny comes home : the domestic fate of U.S. militarism
Authoritarianism;Civil rights;Militarism;Social control;Diplomatic relations;Military policy;Politics and government;United States;e-böcker
Coyne, Christopher J;Hall, Abigail R - Stanford University Press 2018
-
Lessons Learned : How to protect critical information infrastructure
Data protection;Information resources management;Information superhighway;e-böcker
Viira, Toomas - IT Governance Publishing 2018
-
Attribute-Based Access Control
Computer security;Computers;Computer networks;e-böcker
Hu, Vincent - Artech House 2018
-
Fuzzing for software security testing and quality assurance
Computer networks;Computer security;Computer software;e-böcker
DeMott, Jared;Kettunen, Atte;Miller, Charles;Takanen, Ari - Artech House 2018 Second edition.
-
Decrypted : a financial trader's take on cryptocurrency
Electronic funds transfers;Money;e-böcker
Leng, Hoe Lon - Marshall Cavendish Business 2018
-
Finger Knuckle-Print Authentication Using Fast Discrete Orthonormal Stockwell Transform
Biometric identification;e-böcker
Kumar, N. B. Mahesh;Premalatha, K - Anchor Academic Publishing 2018
-
Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Cell phone systems;Mobile computing;e-böcker
Tamma, Rohit - Packt Publishing 2018 Third edition.
-
Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux
Penetration testing (Computer security);e-böcker
Najera-Gutierrez, Gilberto;Ansar, Juned Ahmed - Packt Publishing 2018 Third edition.