Computer security.
Overview
Works: | 855 works in 468 publications in 468 languages |
---|
Titles
Applied cryptography : = protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Hack proofing your Web applications = the only way to stop a hacker is to think like one /
by:
(Language materials, printed)
Linux system security : = an administrator's guide to open source security tools /
by:
(Language materials, printed)
E-policy : = how to develop computer, E-mail, and Internet guidelines to protect your company and its assets /
by:
(Language materials, printed)
Multimedia security : = steganography and digital watermarking techniques for protection of intellectual property /
by:
(Language materials, printed)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(Language materials, printed)
Digital defense : = what you should know about protecting your company's assets /
by:
(Language materials, printed)
Cisco security professional's guide to secure intrusion detection systems
by:
(Language materials, printed)
Information security and ethics = social and organizational issues /
by:
(Language materials, printed)
Tangled web = tales of digital crime from the shadows of cyberspace /
by:
(Language materials, printed)
Trojans, worms, and spyware = a computer security professional's guide to malicious code /
by:
(Language materials, printed)
Querying databases privately = a new approach to private information retrieval /
by:
(Language materials, printed)
The art of software security assessment : = identifying and preventing software vulnerabilities /
by:
(Language materials, printed)
Current security management & ethical issues of information technology
by:
(Language materials, printed)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy/
by:
(Language materials, printed)
Security engineering : = a guide to building dependable distributed systems /
by:
(Language materials, printed)
Information assurance = dependability and security in networked systems /
by:
(Language materials, printed)
Securing Windows server 2008 = prevent attacks from outside and inside your organization.
by:
(Language materials, printed)
No tech hacking = a guide to social engineering, dumpster diving, and shoulder surfing /
by:
(Language materials, printed)
Security in computing systems = challenges, approaches, and solutions /
by:
(Language materials, printed)
Foundations of security analysis and design II = FOSAD 2001/2002 turorial lectures /
by:
(Language materials, printed)
Essential computer security = everyone's guide to e-mail, Internet, and wireless security /
by:
(Language materials, printed)
Real digital forensics : = computer security and incident response /
by:
(Language materials, printed)
Applied cryptography : = protocols, algorithms, and source code in C /
by:
(Language materials, printed)
The art of deception : = controlling the human element of security /
by:
(Language materials, printed)
Information hiding : = steganography and watermarking : attacks and countermeasures /
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
E-policy = how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
by:
(Electronic resources)
Information hiding techniques for steganography and digital watermarking
by:
(Language materials, printed)
The art of software security testing : = identifying software security flaws /
by:
(Language materials, printed)
Microsoft Windows security inside out for Windows XP and Windows 2000
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection
by:
(Language materials, printed)
Disaster proofing information systems = a complete methodology for eliminating single points of failure /
by:
(Language materials, printed)
Writing secure code = practical strategies and proven techniques for building secure applications in a networked world /
by:
(Language materials, printed)
Check Point Next Generation with Application Intelligence Security Administration
by:
(Language materials, printed)
Finding and fixing vulnerabilities in information systems = the vulnerability assessment & mitigation methodology /
by:
(Language materials, printed)
Multimedia security = steganography and digital watermarking techniques for protection of intellectual property /
by:
(Language materials, printed)
Protecting your library's digital sources = the essential guide to planning and preservation /
by:
(Language materials, printed)
Foundations of security analysis and design II = FOSAD 2001/2002 tutorial lectures /
by:
(Language materials, printed)
Safe and secure = secure your home network, and protect your privacy online /
by:
(Language materials, printed)
Information security policies and actions in modern integrated systems
by:
(Language materials, printed)
Security in fixed and wireless networks : = an introduction to securing data communications /
by:
(Language materials, printed)
Security transformation = digital defense strategies to protect your company's reputation and market share /
by:
(Language materials, printed)
Hack proofing your identity in the information age = protect your family on the internet! /
by:
(Language materials, printed)
Protect your digital privacy! = survival skills for the information age /
by:
(Language materials, printed)
The secure online business = e-commerce, IT functionality & business continuity /
by:
(Language materials, printed)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Language materials, printed)
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
by:
(Language materials, printed)
Complexity Theory and Cryptology = An Introduction to Cryptocomplexity /
by:
(Language materials, printed)
Information assurance : = dependability and security in networked systems /
by:
(Language materials, printed)
Contingency planning and disaster recovery : = protecting your organization's resources /
by:
(Language materials, printed)
Engineering secure software and systems = First international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Language materials, printed)
Composition of secure multi-party protocols = a comprehensive study /
by:
(Language materials, printed)
Security engineering with patterns = origins, theoretical models, and new applications /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography
by:
(Language materials, printed)
Machine learning in cyber trust = security, privacy, and reliability /
by:
(Language materials, printed)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Cybercrime : = the transformation of crime in the information age /
by:
(Language materials, printed)
Querying databases privately = a new approach to private information retrieval /
by:
(Language materials, printed)
Vulnerability analysis on the computer network security : = implementation and practices /
by:
(Language materials, printed)
Vulnerability management : = software vulnerability, Gartner, vulnerability (computing) /
by:
(Language materials, printed)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Software engineering for secure systems = industrial and research perspectives /
by:
(Electronic resources)
Virtualization and forensics = a digital forensic investigator's guide to virtual environments /
by:
(Electronic resources)
Security-aware systems applications and software development methods
by:
(Language materials, printed)
Anonymous security systems and applications = requirements and solutions /
by:
(Language materials, printed)
Hacking web apps = detecting and preventing web application security problems /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(Electronic resources)
Advanced concepts for intelligent vision systems = 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Electronic resources)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Electronic resources)
Future data and security engineering = second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Electronic resources)
Risk assessment and risk-driven testing = third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(Electronic resources)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Electronic resources)
Physical and data-link security techniques for future communication systems
by:
(Electronic resources)
Transactions on computational science XXVI = special issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
Cybersecurity in the European Union = resilience and adaptability in governance policy /
by:
(Electronic resources)
Cyber security, cyber crime and cyber forensics = applications and perspectives /
by:
(Electronic resources)
Investigative computer forensics = the practical guide for lawyers, accountants, investigators, and business executives /
by:
(Electronic resources)
Security intelligence = a practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilities = a guide to detection and prevention /
by:
(Electronic resources)
Decision and game theory for security = 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
State of the art in applied cryptography = course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /
by:
(Language materials, printed)
Lectures on data security = modern cryptology in theory and practice /
by:
(Language materials, printed)
Secure Internet programming = security issues for mobile and distributed objects /
by:
(Language materials, printed)
Secure networking - CQRE [Secure] '99 = International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(Language materials, printed)
Selected areas in cryptography = 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings /
by:
(Language materials, printed)
IT-security and privacy = design and use of privacy-enhancing security mechanisms /
by:
(Language materials, printed)
Digital forensics for network, Internet, and cloud computing = a forensic evidence guide for moving targets and data /
by:
(Electronic resources)
Cryptography and security = from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Language materials, printed)
Situational awareness in computer network defense = principles, methods and applications /
by:
(Language materials, printed)
Digital identity and access management = technologies and frameworks /
by:
(Language materials, printed)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Language materials, printed)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(Language materials, printed)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
Cyber security for educational leaders : = a guide to understanding and implementing technology policies /
by:
(Language materials, printed)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
Industrial network security DUP_1 = securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(Electronic resources)
Web application obfuscation DUP_1 = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Ninja hacking DUP_1 = unconventional penetration testing tactics and techniques /
by:
(Electronic resources)
Windows registry forensics DUP_1 = advanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
Network intrusion analysis DUP_1 = methodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
The Web application hacker's handbook : = finding and exploiting security flaws /
by:
(Language materials, printed)
The privacy engineer's manifesto = getting from policy to code to QA to value /
by:
(Electronic resources)
Social media security = leveraging social networking while mitigating risk /
by:
(Electronic resources)
Trustworthy reconfigurable systems = enhancing the security capabilities of reconfigurable hardware architectures /
by:
(Electronic resources)
Platform embedded security technology revealed = safeguarding the future of computing with intel embedded security and management engine /
by:
(Electronic resources)
Advanced API security = securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
by:
(Electronic resources)
Defense against the black arts = how hackers do what they do and how to protect against it /
by:
(Electronic resources)
Security de-engineering = solving the problems in information risk management /
by:
(Electronic resources)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
A New host-based hybrid IDS architecture - a mind of its own : = the know-how of host-based hybrid intrusion detection system architecture using machine learning algorithms with feature selection /
by:
(Language materials, printed)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Enterprise cybersecurity = how to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Privacy in a digital, networked world = technologies, implications and solutions /
by:
(Electronic resources)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.. Part I /
by:
(Electronic resources)
Advances in Digital Forensics XI = 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(Electronic resources)
Cyber security and privacy = 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Electronic resources)
Digital forensics and cyber crime = 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection IX = 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Electronic resources)
E-Democracy - citizen rights in the world of the new computing paradigms = 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Technology and practice of passwords = International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Electronic resources)
Decision and game theory for security = 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Electronic resources)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Electronic resources)
Mobile, secure, and programmable networking = first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2015 = 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Electronic resources)
Internet of vehicles - safe and intelligent mobility = second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Cyber operations = building, defending, and attacking modern computer networks /
by:
(Electronic resources)
Cryptography and coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications = 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Electronic resources)
Advanced information systems engineering workshops = CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016 : proceedings /
by:
(Electronic resources)
Cyber-physical attack recovery procedures = a step-by-step preparation and response guide /
by:
(Electronic resources)
Risk centric threat modeling = process for attack simulation and threat analysis /
by:
(Electronic resources)
Safeguarding critical e-documents = implementing a program for securing confidential information assets /
by:
(Electronic resources)
The second economy = the race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
From hacking to report writing = an introduction to security and penetration testing /
by:
(Electronic resources)
Information security science : = measuring the vulnerability to data compromises /
by:
(Electronic resources)
Role mining in business = taming role-based access control administration /
by:
(Electronic resources)
Cyber security on Azure = an IT professionals guide to Microsoft Azure security center /
by:
(Electronic resources)
Transactions on computational science XXX = Special Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Building a HIPAA-compliant cybersecurity program = using NIST 800-30 and CSF to secure protected health information /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Electronic resources)
Discrete dynamical systems and chaotic machines = theory and applications /
by:
(Electronic resources)
Building a corporate culture of security = strategies for strengthening organizational resiliency /
by:
(Electronic resources)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Electronic resources)
Click, click, who's there? = a family-based non-technical approach to help parents protect their children online /
by:
(Electronic resources)
Networked predictive control of systems with communication constraints and cyber attacks
by:
(Electronic resources)
The NICE cyber security framework = cyber security intelligence and analytics /
by:
(Electronic resources)
Dynamic SQL = applications, performance, and security in Microsoft SQL server /
by:
(Electronic resources)
Guide to automotive connectivity and cybersecurity = trends, technologies, innovations and applications /
by:
(Electronic resources)
From corporate security to commercial force : = a business leader's guide to security economics /
by:
(Electronic resources)
Designing a HIPAA-compliant security operations center = a guide to detecting and responding to healthcare breaches and events /
by:
(Electronic resources)
Building a cybersecurity culture in organizations = how to bridge the gap between people and digital technology /
by:
(Electronic resources)
A complete guide to Burp Suite = learn to detect application vulnerabilities /
by:
(Electronic resources)
Red Hat and IT security = with Red Hat Ansible, Red Hat OpenShift, and Red Hat security auditing /
by:
(Electronic resources)
Machine intelligence and big data analytics for cybersecurity applications
by:
(Electronic resources)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Artificial intelligence for cyber security = methods, issues and possible horizons or opportunities /
by:
(Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part I /
by:
(Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part II /
by:
(Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part III /
by:
(Electronic resources)
Firewalls don't stop dragons = a step-by-step guide to computer security for non-techies /
by:
(Electronic resources)
Malware analysis and detection engineering = a comprehensive approach to detect and analyze modern malware /
by:
(Electronic resources)
Choose your InfoSec path = an interactive cybersecurity adventure for beginners /
by:
(Electronic resources)
Data breach preparation and response = breaches are certain, impact is not /
by:
(Electronic resources)
Tribe of hackers, security leaders = tribal knowledge from the best in cybersecurity leadership /
by:
(Electronic resources)
The CISO'S next frontier = AI, post-quantum cryptography and advanced security paradigms /
by:
(Electronic resources)
Cyber threat intelligence = the no-nonsense guide for CISOs and Security Managers /
by:
(Electronic resources)
Computer security and the internet = tools and jewels from malware to bitcoin /
by:
(Electronic resources)
Introduction to privacy enhancing technologies = a classification-based approach to understanding PETs /
by:
(Electronic resources)
The next era in hardware security = a perspective on emerging technologies for secure electronics /
by:
(Electronic resources)
The security of critical infrastructures = risk, resilience and defense /
by:
(Electronic resources)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(Language materials, printed)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Language materials, printed)
The basics of IT audit = purposes, processes, and practical information /
by:
(Electronic resources)
Collaboration with cloud computing = security, social media, and unified communications /
by:
(Electronic resources)
Applied network security monitoring = collection, detection, and analysis /
by:
(Electronic resources)
Simple steps to data encryption = a practical guide to secure computing /
by:
(Electronic resources)
Preserving privacy against side-channel leaks = from data publishing to web applications /
by:
(Electronic resources)
Concurrency, security, and puzzles = essays dedicated to Andrew William Roscoe on the occasion of his 60th birthday /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXXI = special issue on data and security engineering /
by:
(Electronic resources)
Hardware security and trust = design and deployment of integrated circuits in a threatened environment /
by:
(Electronic resources)
Handbook of system safety and security = cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /
by:
(Electronic resources)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics
by:
(Electronic resources)
Data privacy = foundations, new developments and the big data challenge /
by:
(Electronic resources)
Introduction to intelligent surveillance = surveillance data capture, transmission, and analytics /
by:
(Electronic resources)
Advances in digital forensics XIII = 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
The Huawei and Snowden questions = Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /
by:
(Electronic resources)
Enterprise cybersecurity study guide = how to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations
by:
(Electronic resources)
Trusted digital circuits = hardware trojan vulnerabilities, prevention and detection /
by:
(Electronic resources)
Physically unclonable functions = from basic design principles to advanced hardware security applications /
by:
(Electronic resources)
Autonomous cyber deception = reasoning, adaptive planning, and evaluation of HoneyThings /
by:
(Electronic resources)
Introduction to intelligent surveillance = surveillance data capture, transmission, and analytics /
by:
(Electronic resources)
Cyber operations = building, defending, and attacking modern computer networks /
by:
(Electronic resources)
Professional Red teaming = conducting successful cybersecurity engagements /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Electronic resources)
Port cybersecurity : = securing critical information infrastructures and supply chains /
by:
(Electronic resources)
Human aspects of IT for the aged population = aging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.. Part I /
by:
(Electronic resources)
Human aspects of IT for the aged population = aging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.. Part II /
by:
(Electronic resources)
Navigating new cyber risks = how businesses can plan, build and manage safe spaces in the digital age /
by:
(Electronic resources)
Cybersecurity and secure information systems = challenges and solutions in smart environments /
by:
(Electronic resources)
Practical security properties on commodity computing platforms = the uber extensible micro-hypervisor framework /
by:
(Electronic resources)
Cyber security = the lifeline of information and communication technology /
by:
(Electronic resources)
Identity attack vectors = implementing an effective identity and access management solution /
by:
(Electronic resources)
Binary code fingerprinting for cybersecurity = application to malicious code fingerprinting /
by:
(Electronic resources)
Transactions on computational science XXXVI = special issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
System administration ethics = ten commandments for security and compliance in a modern cyber world /
by:
(Electronic resources)
Solving identity management in modern applications = demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(Electronic resources)
FinTech = the technology driving disruption in the financial services industry /
by:
(Electronic resources)
Information security analytics = finding security insights, patterns, and anomalies in big data /
by:
(Electronic resources)
The science and technology of counterterrorism = measuring physical and electronic security risk /
by:
(Electronic resources)
Digital asset valuation and cyber risk measurement = principles of cybernomics /
by:
(Electronic resources)
Data privacy and trust in cloud computing = building trust in the cloud through assurance and accountability /
by:
(Electronic resources)
Authentication and access control = practical cryptography methods and tools /
by:
(Electronic resources)
Cyber security on Azure = an it professional's guide to Microsoft Azure security /
by:
(Electronic resources)
Building decentralized trust = multidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(Electronic resources)
Blockchain technology and application = third CCF China blockchain conference, CBCC 2020, Jinan, China, December 18-20, 2020 : revised selected papers /
by:
(Electronic resources)
Internet of Things and access control = sensing, monitoring and controlling access in IoT-enabled healthcare systems /
by:
(Electronic resources)
Android software internals quick reference = a field manual and security reference guide to Java-based Android components /
by:
(Electronic resources)
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
by:
(Electronic resources)
Artificial intelligence and blockchain for future cybersecurity applications
by:
(Electronic resources)
Protective security = creating military-grade defenses for your digital business /
by:
(Electronic resources)
Understanding cybersecurity management in FinTech = challenges, strategies, and trends /
by:
(Electronic resources)
Cybersecurity in the electricity sector = managing critical infrastructure /
by:
(Electronic resources)
The art of modelling computational systems = a journey from logic and concurrency to security and privacy : Essays dedicated to Catuscia Palamidessi on the occasion of her 60th birthday /
by:
(Electronic resources)
Beginning security with Microsoft technologies = protecting Office 365, devices, and data /
by:
(Electronic resources)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(Electronic resources)
Database systems for advanced applications = 25th International Conference, DASFAA 2020, Jeju, South Korea, September 24-27, 2020 : proceedings.. Part III /
by:
(Electronic resources)
Algorithms and architectures for parallel processing = 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.. Part III /
by:
(Electronic resources)
Android malware detection using machine learning = data-driven fingerprinting and threat intelligence /
by:
(Electronic resources)
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
by:
(Electronic resources)
Improving information security practices through computational intelligence
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems
by:
(Electronic resources)
Azure security handbook = a comprehensive guide for defending your enterprise environment /
by:
(Electronic resources)
Crypto : = how the code rebels beat the government, saving privacy in the digital age /
by:
(Language materials, printed)
Combating security challenges in the age of big data = powered by state-of-the-art artificial intelligence techniques /
by:
(Electronic resources)
Securing social identity in mobile platforms = technologies for for security, privacy and identity management /
by:
(Electronic resources)
Countering cyber threats to financial institutions = a private and public partnership approach to critical lnfrastructure protection /
by:
(Electronic resources)
Rational cybersecurity for business = the security leaders' guide to business alignment /
by:
(Electronic resources)
Linking sensitive data = methods and techniques for practical privacy-preserving information sharing /
by:
(Electronic resources)
Logic, language, and security = essays dedicated to Andre Scedrov on the occasion of his 65th birthday /
by:
(Electronic resources)
Visual privacy management = design and applications of a privacy-enabling platform /
by:
(Electronic resources)
Cross-layer design for secure and resilient cyber-physical systems = a decision and game theoretic approach /
by:
(Electronic resources)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(Electronic resources)
Artificial intelligence in cyber security: impact and implications = security challenges, technical and ethical issues, forensic investigative challenges /
by:
(Electronic resources)
Artificial intelligence and its contexts = security, business and governance /
by:
(Electronic resources)
Cyber crisis management = the practical handbook on crisis management and crisis communication /
by:
(Electronic resources)
The Effectiveness of Digital Forensics and Security Strategies in Using AI and Machine Learning to Protect Children Online.
by:
(Electronic resources)
Security issues in fog computing from 5G to 6G = architectures, applications and solutions /
by:
(Electronic resources)
Solving identity management in modern applications = demystifying OAuth 2.0, OpenID Connect, and SAML 2 /
by:
(Electronic resources)
24 deadly sins of software security = programming flaws and how to fix them /
by:
(Electronic resources)
Applied Oracle security = developing secure database and middleware environments /
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(Electronic resources)
Vulnerabilities, Cybersecurity, and the Role of Law and Regulation Herein = = Kwetsnaarheden, Cyberveiligheid en de Rol Van Wet- En Regelgevig Hierin.
by:
(Electronic resources)
Sustainable security practices using blockchain, quantum and post-quantum technologies for real time applications
by:
(Electronic resources)
網路安全 : = 捍衛網路戰時代中的關鍵基礎設施 = Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare /
by:
(Language materials, printed)
CyberShock : = surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption /
by:
(Language materials, printed)
The Underground guide to computer security : = slightly askew advice on protecting your PC and what's on it /
by:
(Language materials, printed)
Phishing and communication channels = a guide to identifying and mitigating phishing attacks /
by:
(Electronic resources)
Snowflake access control = mastering the features for data privacy and regulatory compliance /
by:
(Electronic resources)
Blockchain and other emerging technologies for digital business strategies
by:
(Electronic resources)
Guide to differential privacy modifications = a taxonomy of variants and extensions /
by:
(Electronic resources)
Cybersecurity of digital service chains = challenges, methodologies, and tools /
by:
(Electronic resources)
Towards an increased security = green innovations, intellectual property protection and information security /
by:
(Electronic resources)
Explainable artificial intelligence for cyber security = next generation artificial intelligence /
by:
(Electronic resources)
Security compliance in model-driven development of software systems in presence of long-term evolution and variants
by:
(Electronic resources)
Security and resilience in cyber-physical systems = detection, estimation and control /
by:
(Electronic resources)
Citizen privacy framework = case of a fuzzy-based recommender system for political participation /
by:
(Electronic resources)
Machine learning for cybersecurity = innovative deep learning solutions /
by:
(Electronic resources)
IoT system testing = an IoT journey from devices to analytics and the edge /
by:
(Electronic resources)
Modern cryptography = applied mathematics for encryption and information security /
by:
(Electronic resources)
Strategy, leadership, and AI in the cyber ecosystem = the role of digital societies in information governance and decision making /
by:
(Electronic resources)
Security and resilience in intelligent data-centric systems and communication networks
by:
(Electronic resources)
You can stop stupid = stopping losses from accidental and malicious actions /
by:
(Electronic resources)
Intelligent security systems = how artificial intelligence, machine learning and data science work for and against computer security /
by:
(Electronic resources)
Deep learning for computational problems in hardware security = modeling attacks on strong physically unclonable function circuits /
by:
(Electronic resources)
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
by:
(Electronic resources)
Azure security for critical workloads = implementing modern security controls for authentication, authorization and auditing /
by:
(Electronic resources)
Understanding cybersecurity management in decentralized finance = challenges, strategies, and trends /
by:
(Electronic resources)
Handbook of biometric anti-spoofing = presentation attack detection and vulnerability assessment /
by:
(Electronic resources)
Firewalls don't stop dragons = a step-by-step guide to computer security and privacy for non-techies /
by:
(Electronic resources)
An introduction to secret sharing = a systematic overview and guide for protocol selection /
by:
(Electronic resources)
Emerging ICT technologies and cybersecurity = from AI and ML to other futuristic technologies /
by:
(Electronic resources)
Guide to cybersecurity in digital transformation = trends, methods, technologies, applications and best practices /
by:
(Electronic resources)
The NICE cyber security framework = cyber security intelligence and analytics /
by:
(Electronic resources)
Security, trust and privacy models, and architectures in IoT environments
by:
(Electronic resources)
Hacking exposed malware & rootkits = malware & rootkits security secrets & solutions /
by:
(Electronic resources)
Demystifying intelligent multimode security systems = an edge-to-cloud cybersecurity solutions guide /
by:
(Electronic resources)
Safety in the digital age = sociotechnical perspectives on algorithms and machine learning /
by:
(Electronic resources)
Applications for artificial intelligence and digital forensics in national security
by:
(Electronic resources)
Future data and security engineering = big data, security and privacy, smart city and industry 4.0 applications : 10th International Conference, FDSE 2023, Da Nang, Vietnam, November 22-24, 2023 : proceedings /
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity
by:
(Electronic resources)
Fundamentals of information security = a complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Modern cybersecurity strategies for enterprises = protect and secure your enterprise networks, digital business assets, and endpoint security with tested and proven methods /
by:
(Electronic resources)
The Evolution of Logic Locking: Towards Next Generation Logic Locking Countermeasures.
by:
(Electronic resources)
Monte Carlo Planning and Reinforcement Learning for Large Scale Sequential Decision Problems.
by:
(Electronic resources)
A Framework for Dynamic Heterogeneous Information Networks Change Discovery Based on Knowledge Engineering and Data Mining Methods.
by:
(Electronic resources)
The Impact of Cyberattacks and Cyberthreats on Higher Education Institutions.
by:
(Electronic resources)
Use and Analysis of Attack Graphs for Decision Making in a Cybersecurity Defense Plan.
by:
(Electronic resources)
Cybersecurity vigilance and security engineering of Internet of everything
by:
(Electronic resources)
Cyber security impact on digitalization and business intelligence = big cyber security for information management : opportunities and challenges /
by:
(Electronic resources)
Understanding cybersecurity on smartphones = challenges, strategies, and trends /
by:
(Electronic resources)
Mobile, secure, and programmable networking = 9th International Conference, MSPN 2023, Paris, France, October 26-27, 2023 : revised selected papers /
by:
(Electronic resources)
Cybersecurity and artificial intelligence = transformational strategies and disruptive innovation /
by:
(Electronic resources)
Ai-driven cybersecurity and threat intelligence = cyber automation, intelligent decision-making and explainability /
by:
(Electronic resources)
Digital resilience = navigating disruption and safeguarding data privacy /
by:
(Electronic resources)
Identity attack vectors = strategically designing and implementing identity security /
by:
(Electronic resources)
Large language models in cybersecurity = threats, exposure and mitigation /
by:
(Electronic resources)
Privacy preservation in distributed systems = algorithms and applications /
by:
(Electronic resources)
Web3 applications security and new security landscape = theories and practices /
by:
(Electronic resources)
Artificial intelligence for security = enhancing protection in a changing world /
by:
(Electronic resources)
Cybersecurity in a devops environment = from requirements to monitoring /
by:
(Electronic resources)
The Risk that Cyber-Attacks Pose to Outer Space Assets: How Can International Dialogue and Cooperation Help?
by:
(Electronic resources)
The definitive guide to security in Jakarta EE = securing Java-based enterprise applications with Jakarta security, authorization, authentication and more /
by:
(Electronic resources)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(Electronic resources)
Adversarial machine learning = attack surfaces, defence mechanisms, learning theories in artificial intelligence /
by:
(Electronic resources)
Show more
Fewer
Subjects