Data protection.
Overview
Works: | 658 works in 95 publications in 95 languages |
---|
Titles
Security solutions for hyperconnectivity and the Internet of things /
by:
(Language materials, printed)
Auditing corporate surveillance systems : = research methods for greater transparency /
by:
(Language materials, printed)
Information systems security = 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023 : proceedings /
by:
(Language materials, printed)
Security and privacy in the Internet of things = architectures, techniques, and applications /
by:
(Language materials, printed)
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
by:
(Language materials, printed)
Critical Infrastructure Protection XV = 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15–16, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Information Security Technologies in the Decentralized Distributed Networks
by:
(Language materials, printed)
Classical and Physical Security of Symmetric Key Cryptographic Algorithms
by:
(Language materials, printed)
Advanced Computational Paradigms and Hybrid Intelligent Computing = Proceedings of ICACCP 2021 /
by:
(Language materials, printed)
Privacy and Identity Management. Between Data Protection and Security = 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16–20, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Ad Hoc Networks and Tools for IT = 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings /
by:
(Language materials, printed)
Selected Areas in Cryptography = 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Constructive Side-Channel Analysis and Secure Design = 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings /
by:
(Language materials, printed)
IT Security Controls = A Guide to Corporate Standards and Frameworks /
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 2 /
by:
(Language materials, printed)
Proceedings of International Conference on Data Science and Applications = ICDSA 2021, Volume 2 /
by:
(Language materials, printed)
Proceedings of International Conference on Data Science and Applications = ICDSA 2021, Volume 1 /
by:
(Language materials, printed)
Proceedings of Data Analytics and Management = ICDAM 2021, Volume 2 /
by:
(Language materials, printed)
Stream Ciphers in Modern Real-time IT Systems = Analysis, Design and Comparative Studies /
by:
(Language materials, printed)
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
by:
(Language materials, printed)
Code-Based Cryptography = 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21–22, 2021 Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in New Computing Environments = 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings /
by:
(Language materials, printed)
Recent Innovations in Computing = Proceedings of ICRIC 2021, Volume 1 /
by:
(Language materials, printed)
Privacy Technologies and Policy = 10th Annual Privacy Forum, APF 2022, Warsaw, Poland, June 23–24, 2022, Proceedings /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 12th International Conference, ATIS 2021, Virtual Event, December 16–17, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Big Data and Security = Third International Conference, ICBDS 2021, Shenzhen, China, November 26–28, 2021, Proceedings /
by:
(Language materials, printed)
Smart Card Research and Advanced Applications = 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Transformations Through Blockchain Technology = The New Digital Revolution /
by:
(Language materials, printed)
Advances in Information and Computer Security = 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings /
by:
(Language materials, printed)
The Complete Guide to SCION = From Design Principles to Formal Verification /
by:
(Language materials, printed)
Cyber Security, Privacy and Networking = Proceedings of ICSPN 2021 /
by:
(Language materials, printed)
Cyber Security and Digital Forensics = Proceedings of ICCSDF 2021 /
by:
(Language materials, printed)
Obstructions in Security-Aware Business Processes = Analysis, Detection, and Handling /
by:
(Language materials, printed)
Information Security and Cryptology – ICISC 2021 = 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Intelligent Technologies and Applications = 4th International Conference, INTAP 2021, Grimstad, Norway, October 11–13, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Advanced Techniques for IoT Applications = Proceedings of EAIT 2020 /
by:
(Language materials, printed)
Human Aspects of Information Security and Assurance = 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings /
by:
(Language materials, printed)
Cloud Attack Vectors = Building Effective Cyber-Defense Strategies to Protect Cloud Resources /
by:
(Language materials, printed)
Frontiers in Cyber Security = 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Intelligent Information Hiding and Multimedia Signal Processing = Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 /
by:
(Language materials, printed)
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
by:
(Language materials, printed)
Socio-Technical Aspects in Security = 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Data and Applications Security and Privacy XXXVI = 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18–20, 2022, Proceedings /
by:
(Language materials, printed)
Advances in Digital Forensics XVIII = 18th IFIP WG 11.9 International Conference, Virtual Event, January 3–4, 2022, Revised Selected Papers /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I /
by:
(Language materials, printed)
Advances in Artificial Intelligence and Security = 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part III /
by:
(Language materials, printed)
Advances in Intelligent Information Hiding and Multimedia Signal Processing = Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 1 /
by:
(Language materials, printed)
Link Technology to Your Long-Term Business Goals = How to Use Technology to Mobilize Your People, Strategy and Operations /
by:
(Language materials, printed)
Rising Threats in Expert Applications and Solutions = Proceedings of FICR-TEAS 2022 /
by:
(Language materials, printed)
Proceedings of International Conference on Computational Intelligence and Computing = ICCIC 2020 /
by:
(Language materials, printed)
Artificial Intelligence and Security = 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II /
by:
(Language materials, printed)
Security in Computer and Information Sciences = Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Detection of Intrusions and Malware, and Vulnerability Assessment = 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings /
by:
(Language materials, printed)
Cyber Security, Cryptology, and Machine Learning = 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings /
by:
(Language materials, printed)
Applied Cryptography and Network Security = 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings /
by:
(Language materials, printed)
Smart Systems: Innovations in Computing = Proceedings of SSIC 2021 /
by:
(Language materials, printed)
Foundations and Practice of Security = 14th International Symposium, FPS 2021, Paris, France, December 7–10, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Information Security Education - Adapting to the Fourth Industrial Revolution = 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings /
by:
(Language materials, printed)
The Future of Financial Systems in the Digital Age = Perspectives from Europe and Japan /
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings /
by:
(Language materials, printed)
ICT Systems Security and Privacy Protection = 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings /
by:
(Language materials, printed)
Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context
by:
(Language materials, printed)
Advances in Cryptology – EUROCRYPT 2022 = 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 – June 3, 2022, Proceedings, Part III /
by:
(Language materials, printed)
Proceedings of 2nd International Conference on Smart Computing and Cyber Security = Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2021) /
by:
(Language materials, printed)
Energy Resilience and Climate Protection = Energy systems, critical infrastructures, and sustainability goals /
by:
(Language materials, printed)
Advanced Information Systems Engineering Workshops = CAiSE 2022 International Workshops, Leuven, Belgium, June 6–10, 2022, Proceedings /
by:
(Language materials, printed)
Web Services – ICWS 2022 = 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10–14, 2022, Proceedings /
by:
(Language materials, printed)
Information Systems Security = 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings /
by:
(Language materials, printed)
Das Standard-Datenschutzmodell (SDM) = Einführung, Hintergründe und Kontexte zum Erreichen der Gewährleistungsziele /
by:
(Language materials, printed)
Information Security = 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings /
by:
(Language materials, printed)
Network and System Security = 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings /
by:
(Language materials, printed)
Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch = 250 Fragen mit Antworten und 10 Übungsfälle mit Lösungen /
by:
(Language materials, printed)
Frontiers in Cyber Security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
by:
(Language materials, printed)
Information Security and Privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection XVI = 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers /
by:
(Language materials, printed)
Guide to Internet Cryptography = Security Protocols and Real-World Attack Implications /
by:
(Language materials, printed)
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications = 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23–25, 2022, Proceedings /
by:
(Language materials, printed)
Information Security Practice and Experience = 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings /
by:
(Language materials, printed)
Pro Encryption in SQL Server 2022 = Provide the Highest Level of Protection for Your Data /
by:
(Language materials, printed)
A European Perspective on Crisis Informatics = Citizens’ and Authorities’ Attitudes Towards Social Media for Public Safety and Security /
by:
(Language materials, printed)
Cryptology and Network Security = 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, Proceedings /
by:
(Language materials, printed)
Datenwirtschaft und Datentechnologie = Wie aus Daten Wert entsteht /
by:
(Language materials, printed)
Telematics and Computing = 11th International Congress, WITCOM 2022, Cancún, México, November 7–11, 2022, Proceedings /
by:
(Language materials, printed)
Modern Cryptography = Applied Mathematics for Encryption and Information Security /
by:
(Language materials, printed)
How to Create a Web3 Startup = A Guide for Tomorrow’s Breakout Companies /
by:
(Language materials, printed)
Financial Cryptography and Data Security = 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
by:
(Language materials, printed)
Privacy Symposium 2022 = Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) /
by:
(Language materials, printed)
Multimedia Communications, Services and Security = 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, Proceedings /
by:
(Language materials, printed)
Innovative Security Solutions for Information Technology and Communications = 14th International Conference, SecITC 2021, Virtual Event, November 25–26, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Cyber-Security Threats and Response Models in Nuclear Power Plants
by:
(Language materials, printed)
Security and Privacy in Social Networks and Big Data = 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings /
by:
(Language materials, printed)
Trust, Privacy and Security in Digital Business = 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings /
by:
(Language materials, printed)
Progress in Cryptology - AFRICACRYPT 2022 = 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022, Proceedings /
by:
(Language materials, printed)
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems = 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers /
by:
(Language materials, printed)
System Firmware = An Essential Guide to Open Source and Embedded Solutions /
by:
(Language materials, printed)
Science of Cyber Security = 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers /
by:
(Language materials, printed)
Cyberspace Safety and Security = 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings /
by:
(Language materials, printed)
Perfect Secrecy in IoT = A Hybrid Combinatorial-Boolean Approach /
by:
(Language materials, printed)
Crypto Basics = A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors /
by:
(Language materials, printed)
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part I /
by:
(Language materials, printed)
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III /
by:
(Language materials, printed)
Applied Cryptography and Network Security Workshops = ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings /
by:
(Language materials, printed)
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II /
by:
(Language materials, printed)
Principles of Social Networking = The New Horizon and Emerging Challenges /
by:
(Language materials, printed)
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
by:
(Language materials, printed)
Citizen Privacy Framework = Case of a Fuzzy-based Recommender System for Political Participation /
by:
(Language materials, printed)
Privacy in Statistical Databases = International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings /
by:
(Language materials, printed)
Distributed Computing and Optimization Techniques = Select Proceedings of ICDCOT 2021 /
by:
(Language materials, printed)
Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum = BPM 2022 Blockchain, RPA, and CEE Forum, Münster, Germany, September 11–16, 2022, Proceedings /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops = DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings /
by:
(Language materials, printed)
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
by:
(Language materials, printed)
Security and Cryptography for Networks = 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022, Proceedings /
by:
(Language materials, printed)
Electronic Voting = 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings /
by:
(Language materials, printed)
Secure and Trusted Cyber Physical Systems = Recent Approaches and Future Directions /
by:
(Language materials, printed)
Artificial Intelligence and Security = 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part III /
by:
(Language materials, printed)
Cyber Warfare, Security and Space Research = First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Proceedings of the Seventh International Conference on Mathematics and Computing = ICMC 2021 /
by:
(Language materials, printed)
Recent Trends in Image Processing and Pattern Recognition = 4th International Conference, RTIP2R 2021, Msida, Malta, December 8-10, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Emerging Technologies for Authorization and Authentication = 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Cyber Crisis Management = The Practical Handbook on Crisis Management and Crisis Communication /
by:
(Language materials, printed)
Service-Oriented Computing – ICSOC 2020 Workshops = AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings /
by:
(Language materials, printed)
Mobile, Secure, and Programmable Networking = 6th International Conference, MSPN 2020, Paris, France, October 28–29, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part II /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops = DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings /
by:
(Language materials, printed)
Computer Safety, Reliability, and Security = 40th International Conference, SAFECOMP 2021, York, UK, September 8–10, 2021, Proceedings /
by:
(Language materials, printed)
Disinformation in Open Online Media = Third Multidisciplinary International Symposium, MISDOOM 2021, Virtual Event, September 21–22, 2021, Proceedings /
by:
(Language materials, printed)
Proceedings of International Conference on Frontiers in Computing and Systems = COMSYS 2020 /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings /
by:
(Language materials, printed)
Privacy and Security Issues in Big Data = An Analytical View on Business Intelligence /
by:
(Language materials, printed)
Machine Learning and Intelligent Communications = 5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020, Proceedings /
by:
(Language materials, printed)
Challenging Online Propaganda and Disinformation in the 21st Century
by:
(Language materials, printed)
Pro Google Cloud Automation = With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins /
by:
(Language materials, printed)
Data Privacy and Trust in Cloud Computing = Building trust in the cloud through assurance and accountability /
by:
(Language materials, printed)
HCI in Business, Government and Organizations = 8th International Conference, HCIBGO 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings /
by:
(Language materials, printed)
Python Testing with Selenium = Learn to Implement Different Testing Techniques Using the Selenium WebDriver /
by:
(Language materials, printed)
Information Security Education for Cyber Resilience = 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22–24, 2021, Proceedings /
by:
(Language materials, printed)
Infrastructure-as-Code Automation Using Terraform, Packer, Vault, Nomad and Consul = Hands-on Deployment, Configuration, and Best Practices /
by:
(Language materials, printed)
Jump-start Your SOC Analyst Career = A Roadmap to Cybersecurity Success /
by:
(Language materials, printed)
Proceedings of the 9th International Conference on Computer Engineering and Networks
by:
(Language materials, printed)
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
by:
(Language materials, printed)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
by:
(Language materials, printed)
New methods and tools for intelligent data processing and information security systems
by:
(Language materials, printed)
Improving information security practices through computational intelligence
by:
(Language materials, printed)
Human-Centric Computing in a Data-Driven Society = 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, Tokyo, Japan, September 9–11, 2020, Proceedings /
by:
(Language materials, printed)
Mobile Security = Schwachstellen verstehen und Angriffsszenarien nachvollziehen /
by:
(Language materials, printed)
Transactions on Computational Science XXXV = Special Issue on Signal Processing and Security in Distributed Systems /
by:
(Language materials, printed)
Information and Communications Security = 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Security Protocols XXVII = 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Computer Vision – ECCV 2020 = 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XXIII /
by:
(Language materials, printed)
Designing a HIPAA-Compliant Security Operations Center = A Guide to Detecting and Responding to Healthcare Breaches and Events /
by:
(Language materials, printed)
Selected Areas in Cryptography – SAC 2019 = 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices = 33rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2020, Kitakyushu, Japan, September 22-25, 2020, Proceedings /
by:
(Language materials, printed)
Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration = With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Günter Brauch /
by:
(Language materials, printed)
Handbook of Computer Networks and Cyber Security = Principles and Paradigms /
by:
(Language materials, printed)
Encryption for Organizations and Individuals = Basics of Contemporary and Quantum Cryptography /
by:
(Language materials, printed)
Mobile Internet Security = 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17–19, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Rational Cybersecurity for Business = The Security Leaders' Guide to Business Alignment /
by:
(Language materials, printed)
21st Century Prometheus = Managing CBRN Safety and Security Affected by Cutting-Edge Technologies /
by:
(Language materials, printed)
Innovations and Interdisciplinary Solutions for Underserved Areas = 4th EAI International Conference, InterSol 2020, Nairobi, Kenya, March 8-9, 2020, Proceedings /
by:
(Language materials, printed)
Analysis and Design of Next-Generation Software Architectures = 5G, IoT, Blockchain, and Quantum Computing /
by:
(Language materials, printed)
Blockchain Technology for Industry 4.0 = Secure, Decentralized, Distributed and Trusted Industry Environment /
by:
(Language materials, printed)
Distributed Computing and Internet Technology = 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings /
by:
(Language materials, printed)
Advances in Intelligent Information Hiding and Multimedia Signal Processing = Proceedings of the 15th International Conference on IIH-MSP in conjunction with the 12th International Conference on FITAT, July 18–20, Jilin, China, Volume 2 /
by:
(Language materials, printed)
IC-BCT 2019 = Proceedings of the International Conference on Blockchain Technology /
by:
(Language materials, printed)
Emerging Technologies for Authorization and Authentication = Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
by:
(Language materials, printed)
Identity Attack Vectors = Implementing an Effective Identity and Access Management Solution /
by:
(Language materials, printed)
Building Secure Firmware = Armoring the Foundation of the Platform /
by:
(Language materials, printed)
Security Infrastructure Technology for Integrated Utilization of Big Data = Applied to the Living Safety and Medical Fields /
by:
(Language materials, printed)
Implementing computational intelligence techniques for security systems design /
by:
(Language materials, printed)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Language materials, printed)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Business plans handbook. = a compilation of actual business plans developed by small businesses throughout North America /. Volume 9
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
Digital data integrity : = the evolution from passive protection to active management /
by:
(Language materials, printed)
Information security = design, implementation, measurement, and compliance /
by:
(Language materials, printed)
The future of identity in the information society = challenges and opportunities /
by:
(Language materials, printed)
Protecting your health privacy = a citizen's guide to safeguarding the security of your medical information /
by:
(Language materials, printed)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(Language materials, printed)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Language materials, printed)
Expert oracle and Java Security = programming secure Oracle database applications with Java /
by:
(Language materials, printed)
Preventing good people from doing bad things = implementing least privilege /
by:
(Language materials, printed)
CISO soft skills : = securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by:
(Language materials, printed)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Language materials, printed)
Foundations of security analysis and design VI = FOSAD tutorial lectures /
by:
(Language materials, printed)
Data governance = how to design, deploy, and sustain an effective data governance program /
by:
(Language materials, printed)
Mobile device security : = a comprehensive guide to securing your information in a moving world /
by:
(Language materials, printed)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(Language materials, printed)
Privacy in a digital, networked world = technologies, implications and solutions /
by:
(Language materials, printed)
Information security governance = a practical development and implementation approach /
by:
(Language materials, printed)
Advances in artificial intelligence for privacy protection and security
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Language materials, printed)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Language materials, printed)
Information security, coding theory and related combinatorics = information coding and combinatorics /
by:
(Language materials, printed)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(Language materials, printed)
Information technology risk management in enterprise environments : = a review of industry practices and a practical guide to risk management teams /
by:
(Language materials, printed)
Information security governance : = a practical development and implementation approach /
by:
(Language materials, printed)
Secure ICT service provisioning for cloud, mobile and beyond = a workable architectural approach balancing between buyers and providers /
by:
(Language materials, printed)
Enterprise identity management = towards an investment decision support approach /
by:
(Language materials, printed)
Securing digital video = techniques for DRM and content protection /
by:
(Language materials, printed)
Sensor systems and software = 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013: revised selected papers /
by:
(Language materials, printed)
Security and privacy in communication networks = 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013 : revised selected papers /
by:
(Language materials, printed)
Critical infrastructure protection VII = 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013 : revised selected papers /
by:
(Language materials, printed)
Frontiers in internet technologies = Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013 : revised selected papers /
by:
(Language materials, printed)
Collaborative financial infrastructure protection = tools, abstractions, and middleware /
by:
(Language materials, printed)
Privacy solutions and security frameworks in information protection
by:
(Language materials, printed)
Security de-engineering = solving the problems in information risk management /
by:
(Language materials, printed)
Total information risk management = maximizing the value of data and information assets /
by:
(Language materials, printed)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Language materials, printed)
Passive and active measurement = 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(Language materials, printed)
The privacy engineer's manifesto = getting from policy to code to QA to value /
by:
(Language materials, printed)
Implementing database security and auditing = a guide for DBA's, information security administrators and auditors /
by:
(Language materials, printed)
Data stewardship = an actionable guide to effective data management and data governance /
by:
(Language materials, printed)
Cyber Security Intelligence and Analytics = The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 /
by:
(Language materials, printed)
Cloud Computing – CLOUD 2021 = 14th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings /
by:
(Language materials, printed)
The Right to Data Protection = Individual and Structural Dimensions of Data Protection in EU Law /
by:
(Language materials, printed)
Information Retrieval and Natural Language Processing = A Graph Theory Approach /
by:
(Language materials, printed)
Secure Knowledge Management In The Artificial Intelligence Era = 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021, Proceedings /
by:
(Language materials, printed)
Algorithms and Architectures for Parallel Processing = 21st International Conference, ICA3PP 2021, Virtual Event, December 3–5, 2021, Proceedings, Part III /
by:
(Language materials, printed)
Sensor- and Video-Based Activity and Behavior Computing = Proceedings of 3rd International Conference on Activity and Behavior Computing (ABC 2021) /
by:
(Language materials, printed)
Digital Technologies in Teaching and Learning Strategies = Proceedings of DTTLS-2021 /
by:
(Language materials, printed)
Mobile Forensics – The File Format Handbook = Common File Formats and File Systems Used in Mobile Devices /
by:
(Language materials, printed)
Blockchain and Other Emerging Technologies for Digital Business Strategies
by:
(Language materials, printed)
ITNG 2022 19th International Conference on Information Technology-New Generations
by:
(Language materials, printed)
Artificial Intelligence and Mobile Services – AIMS 2021 = 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings /
by:
(Language materials, printed)
Silicon Valley Cybersecurity Conference = Second Conference, SVCC 2021, San Jose, CA, USA, December 2–3, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Blockchain – ICBC 2021 = 4th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings /
by:
(Language materials, printed)
Illumination of Artificial Intelligence in Cybersecurity and Forensics
by:
(Language materials, printed)
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
by:
(Language materials, printed)
Handbook of Digital Face Manipulation and Detection = From DeepFakes to Morphing Attacks /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings /
by:
(Language materials, printed)
The Development of Blockchain Technology = Research on the Development of Electronic Information Engineering Technology in China /
by:
(Language materials, printed)
Azure Cloud Security for Absolute Beginners = Enabling Cloud Infrastructure Security with Multi-Level Security Options /
by:
(Language materials, printed)
Understand, Manage, and Measure Cyber Risk = Practical Solutions for Creating a Sustainable Cyber Program /
by:
(Language materials, printed)
Phishing and Communication Channels = A Guide to Identifying and Mitigating Phishing Attacks /
by:
(Language materials, printed)
Business Process Management Workshops = BPM 2021 International Workshops, Rome, Italy, September 6–10, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Data Privacy Management, Cryptocurrencies and Blockchain Technology = ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Mobile Internet Security = 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Informatics and Intelligent Applications = First International Conference, ICIIA 2021, Ota, Nigeria, November 25–27, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Cyber Security = 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Digital Forensics and Watermarking = 20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Information Systems Security and Privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Soft Computing for Security Applications = Proceedings of ICSCS 2021 /
by:
(Language materials, printed)
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems = The Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) /
by:
(Language materials, printed)
Explainable Artificial Intelligence for Cyber Security = Next Generation Artificial Intelligence /
by:
(Language materials, printed)
Recent Innovations in Computing = Proceedings of ICRIC 2021, Volume 2 /
by:
(Language materials, printed)
The Definitive Guide to Security in Jakarta EE = Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More /
by:
(Language materials, printed)
Automotive Cybersecurity = Security-Bausteine für Automotive Embedded Systeme /
by:
(Language materials, printed)
Guide to Differential Privacy Modifications = A Taxonomy of Variants and Extensions /
by:
(Language materials, printed)
Risks and Security of Internet and Systems = 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security
by:
(Language materials, printed)
Computer Security. ESORICS 2021 International Workshops = CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Emerging Information Security and Applications = Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Security, Privacy and Data Analytics = Select Proceedings of ISPDA 2021 /
by:
(Language materials, printed)
Security and Artificial Intelligence = A Crossdisciplinary Approach /
by:
(Language materials, printed)
Cyberspace Safety and Security = 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings /
by:
(Language materials, printed)
Cybersecurity of Digital Service Chains = Challenges, Methodologies, and Tools /
by:
(Language materials, printed)
Proceedings of Data Analytics and Management = ICDAM 2021, Volume 1 /
by:
(Language materials, printed)
Business Information Systems Workshops = BIS 2021 International Workshops, Virtual Event, June 14–17, 2021, Revised Selected Papers /
by:
(Language materials, printed)
Data Security = Technical and Organizational Protection Measures against Data Loss and Computer Crime /
by:
(Language materials, printed)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps
by:
(Language materials, printed)
Advanced ASP.NET Core 3 Security = Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website /
by:
(Language materials, printed)
Serverless Security = Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud /
by:
(Language materials, printed)
HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies = 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings /
by:
(Language materials, printed)
Computational Science and Its Applications – ICCSA 2020 = 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part III /
by:
(Language materials, printed)
Quality, Reliability, Security and Robustness in Heterogeneous Systems = 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22–23, 2019, Proceedings /
by:
(Language materials, printed)
E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age = 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings /
by:
(Language materials, printed)
Information Security Education. Information Security in Action = 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
by:
(Language materials, printed)
Combating Security Challenges in the Age of Big Data = Powered by State-of-the-Art Artificial Intelligence Techniques /
by:
(Language materials, printed)
Cognitive Modeling for Automated Human Performance Evaluation at Scale
by:
(Language materials, printed)
Datensicherheit = Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität /
by:
(Language materials, printed)
Firewalls Don't Stop Dragons = A Step-by-Step Guide to Computer Security and Privacy for Non-Techies /
by:
(Language materials, printed)
Privileged Attack Vectors = Building Effective Cyber-Defense Strategies to Protect Organizations /
by:
(Language materials, printed)
The Palgrave Handbook of International Cybercrime and Cyberdeviance
by:
(Language materials, printed)
Smart Grid and Internet of Things = Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
by:
(Language materials, printed)
Computer Vision – ECCV 2020 = 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XVII /
by:
(Language materials, printed)
Machine Learning for Networking = Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3–5, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Internet of Vehicles. Technologies and Services Toward Smart Cities = 6th International Conference, IOV 2019, Kaohsiung, Taiwan, November 18–21, 2019, Proceedings /
by:
(Language materials, printed)
Social Network Analysis and Law Enforcement = Applications for Intelligence Analysis /
by:
(Language materials, printed)
Advances in Cyber Security = First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Future Data and Security Engineering = 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Proceedings /
by:
(Language materials, printed)
Implementing an Information Security Management System = Security Management Based on ISO 27001 Guidelines /
by:
(Language materials, printed)
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications = 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Proceedings /
by:
(Language materials, printed)
Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)
by:
(Language materials, printed)
Cyberspace Mimic Defense = Generalized Robust Control and Endogenous Security /
by:
(Language materials, printed)
Binary Code Fingerprinting for Cybersecurity = Application to Malicious Code Fingerprinting /
by:
(Language materials, printed)
Risks and Security of Internet and Systems = 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings /
by:
(Language materials, printed)
Wireless Algorithms, Systems, and Applications = 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II /
by:
(Language materials, printed)
Advances in Intelligent Information Hiding and Multimedia Signal Processing = Proceedings of the 15th International Conference on IIH-MSP in conjunction with the 12th International Conference on FITAT, July 18-20, Jilin, China, Volume 1 /
by:
(Language materials, printed)
The Palgrave Handbook of International Cybercrime and Cyberdeviance
by:
(Language materials, printed)
Blockchain and Trustworthy Systems = Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers /
by:
(Language materials, printed)
Data stewardship = an actionable guide to effective data management and data governance /
by:
(Language materials, printed)
Security leader insights for information protection = lessons and strategies from leading security professionals /
by:
(Language materials, printed)
Enhancing information security and privacy by combining biometrics with cryptography
by:
(Language materials, printed)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Language materials, printed)
Attribute-based credentials for trust = identity in the information society /
by:
(Language materials, printed)
Improving information security practices through computational intelligence /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems
by:
(Language materials, printed)
Data protection on the move = current developments in ICT and privacy/data protection /
by:
(Language materials, printed)
Virtuality and capabilities in a world of ambient intelligence = new challenges to privacy and data protection /
by:
(Language materials, printed)
Data thieves in action = examining the international market for stolen personal information /
by:
(Language materials, printed)
Elements of cloud storage security = concepts, designs and optimized practices /
by:
(Language materials, printed)
Cognitive hack : = the new battleground in cybersecurity... the human mind /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things
by:
(Language materials, printed)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(Language materials, printed)
Data privacy = foundations, new developments and the big data challenge /
by:
(Language materials, printed)
Security and privacy in cyber-physical systems : = foundations, principles, and applications /
by:
(Language materials, printed)
Information technology risk management and compliance in modern organizations
by:
(Language materials, printed)
Risk centric threat modeling = process for attack simulation and threat analysis /
by:
(Language materials, printed)
Security and privacy in cyber-physical systems = foundations, principles, and applications /
by:
(Language materials, printed)
Applications of data management and analysis = case studies in social networks and beyond /
by:
(Language materials, printed)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Language materials, printed)
Multimedia forensics and security = foundations, innovations, and applications /
by:
(Language materials, printed)
Data protection and privacy = (In)visibilities and infrastructures /
by:
(Language materials, printed)
A Practical Guide to TPM 2.0 = Using the Trusted Platform Module in the New Age of Security /
by:
(Language materials, printed)
Cyber Operations = Building, Defending, and Attacking Modern Computer Networks /
by:
(Language materials, printed)
Enterprise Cybersecurity = How to Build a Successful Cyberdefense Program Against Advanced Threats /
by:
(Language materials, printed)
Security Standardisation Research = Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings /
by:
(Language materials, printed)
Practical Information Security Management = A Complete Guide to Planning and Implementation /
by:
(Language materials, printed)
Privacy and Identity Management. Facing up to Next Steps = 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Information Systems Security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /
by:
(Language materials, printed)
Building a Comprehensive IT Security Program = Practical Guidelines and Best Practices /
by:
(Language materials, printed)
Cybersecurity for Hospitals and Healthcare Facilities = A Guide to Detection and Prevention /
by:
(Language materials, printed)
Progress in Cryptology – INDOCRYPT 2016 = 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings /
by:
(Language materials, printed)
Innovations for Community Services = 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers /
by:
(Language materials, printed)
From Hacking to Report Writing = An Introduction to Security and Penetration Testing /
by:
(Language materials, printed)
Global Security, Safety and Sustainability: The Security Challenges of the Connected World = 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings /
by:
(Language materials, printed)
Penetration Testing Basics = A Quick-Start Guide to Breaking into Systems /
by:
(Language materials, printed)
Information and Communications Security = 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection X = 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Cyber-Physical Attack Recovery Procedures = A Step-by-Step Preparation and Response Guide /
by:
(Language materials, printed)
Security, Privacy and Anonymity in Computation, Communication and Storage = SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings /
by:
(Language materials, printed)
Electronic Voting = Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings /
by:
(Language materials, printed)
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference = Science as the first countermeasure for CBRNE and Cyber threats /
by:
(Language materials, printed)
Information Technology - New Generations = 15th International Conference on Information Technology /
by:
(Language materials, printed)
Security in Computer and Information Sciences = First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Pro iOS Security and Forensics = Enterprise iPhone and iPad Safety /
by:
(Language materials, printed)
IT-Sicherheit mit System = Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement – Sichere Anwendungen – Standards und Practices /
by:
(Language materials, printed)
Cyber Situational Awareness in Public-Private-Partnerships = Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen /
by:
(Language materials, printed)
Smart Blockchain = First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedings /
by:
(Language materials, printed)
Hybride Testumgebungen für Kritische Infrastrukturen = Effiziente Implementierung für IT-Sicherheitsanalysen von KRITIS-Betreibern /
by:
(Language materials, printed)
Cybersecurity Best Practices = Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden /
by:
(Language materials, printed)
Oracle Incident Response and Forensics = Preparing for and Responding to Data Breaches /
by:
(Language materials, printed)
Cybersecurity Incident Response = How to Contain, Eradicate, and Recover from Incidents /
by:
(Language materials, printed)
Securing the Perimeter = Deploying Identity and Access Management with Free Open Source Software /
by:
(Language materials, printed)
Network Intrusion Detection using Deep Learning = A Feature Learning Approach /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings /
by:
(Language materials, printed)
Beginning Ethical Hacking with Kali Linux = Computational Techniques for Resolving Security Issues /
by:
(Language materials, printed)
Smart Multimedia = First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Engineering Applications of Neural Networks = 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection XII = 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Information Systems Security = 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /
by:
(Language materials, printed)
Network and Parallel Computing = 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedings /
by:
(Language materials, printed)
Research and Practical Issues of Enterprise Information Systems = 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedings /
by:
(Language materials, printed)
Security Protocols XXVI = 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Emerging Technologies for Authorization and Authentication = First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings /
by:
(Language materials, printed)
Smart Trends in Information Technology and Computer Communications = Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Firewalls Don't Stop Dragons = A Step-by-Step Guide to Computer Security for Non-Techies /
by:
(Language materials, printed)
Cloud Computing, Security, Privacy in New Computing Environments = 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
by:
(Language materials, printed)
Transactions on Computational Science XXXII = Special Issue on Cybersecurity and Biometrics /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings /
by:
(Language materials, printed)
Mathematics and Computing = 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings /
by:
(Language materials, printed)
5G for Future Wireless Networks = First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings /
by:
(Language materials, printed)
Security and Privacy in Communication Networks = 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings /
by:
(Language materials, printed)
Mobile Internet Security = First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers /
by:
(Language materials, printed)
Ad Hoc Networks = 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings /
by:
(Language materials, printed)
Privileged Attack Vectors = Building Effective Cyber-Defense Strategies to Protect Organizations /
by:
(Language materials, printed)
Privacy and Identity Management. The Smart Revolution = 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Asset Attack Vectors = Building Effective Vulnerability Management Strategies to Protect Organizations /
by:
(Language materials, printed)
Engineering Secure Software and Systems = 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings /
by:
(Language materials, printed)
Emerging Technologies for Developing Countries = First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings /
by:
(Language materials, printed)
Future Network Systems and Security = 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings /
by:
(Language materials, printed)
Enterprise Cybersecurity Study Guide = How to Build a Successful Cyberdefense Program Against Advanced Threats /
by:
(Language materials, printed)
IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen = HMD Best Paper Award 2017 /
by:
(Language materials, printed)
Open Source Intelligence Methods and Tools = A Practical Guide to Online Intelligence /
by:
(Language materials, printed)
Future Internet Technologies and Trends = First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings /
by:
(Language materials, printed)
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
by:
(Language materials, printed)
Trust Management XII = 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings /
by:
(Language materials, printed)
Foundations and Practice of Security = 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Fundamentals and Applications of Hardcopy Communication = Conveying Side Information by Printed Media /
by:
(Language materials, printed)
Communications and Networking = 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part II /
by:
(Language materials, printed)
Communications and Networking = 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I /
by:
(Language materials, printed)
Advanced Hybrid Information Processing = First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings /
by:
(Language materials, printed)
Sicherheitskritische Mensch-Computer-Interaktion = Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement /
by:
(Language materials, printed)
Defending IoT Infrastructures with the Raspberry Pi = Monitoring and Detecting Nefarious Behavior in Real Time /
by:
(Language materials, printed)
Joint Security Management: organisationsübergreifend handeln = Mehr Sicherheit im Zeitalter von Cloud-Computing, IT-Dienstleistungen und industrialisierter IT-Produktion /
by:
(Language materials, printed)
Industrial Networks and Intelligent Systems = 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings /
by:
(Language materials, printed)
Innovation and Interdisciplinary Solutions for Underserved Areas = First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedings /
by:
(Language materials, printed)
Implementing computational intelligence techniques for security systems design
by:
(Language materials, printed)
Advancements in security and privacy initiatives for multimedia images
by:
(Language materials, printed)
You: for sale = protecting your personal data and privacy online /
by:
(Language materials, printed)
Cloud Computing – CLOUD 2019 = 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings /
by:
(Language materials, printed)
Mobile Computing, Applications, and Services = 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedings /
by:
(Language materials, printed)
Practical Cryptography in Python = Learning Correct Cryptography by Example /
by:
(Language materials, printed)
Autonomous Cyber Deception = Reasoning, Adaptive Planning, and Evaluation of HoneyThings /
by:
(Language materials, printed)
Information Security Practice and Experience = 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings /
by:
(Language materials, printed)
Future Data and Security Engineering = 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
by:
(Language materials, printed)
Artificial Intelligence for Communications and Networks = First EAI International Conference, AICON 2019, Harbin, China, May 25–26, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Karma-based API on Apple Platforms = Building Privacy Into iOS and macOS Apps /
by:
(Language materials, printed)
Beginning Security with Microsoft Technologies = Protecting Office 365, Devices, and Data /
by:
(Language materials, printed)
Post-Quantum Cryptography = 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers /
by:
(Language materials, printed)
Practical Cyber Forensics = An Incident-Based Approach to Forensic Investigations /
by:
(Language materials, printed)
Handbook of Multimedia Information Security: Techniques and Applications
by:
(Language materials, printed)
Information Security Education. Education in Proactive Information Security = 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings /
by:
(Language materials, printed)
Advances in Visual Informatics = 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19–21, 2019, Proceedings /
by:
(Language materials, printed)
Applications and Techniques in Information Security = 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings /
by:
(Language materials, printed)
Risks and Security of Internet and Systems = 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Resilience of Cyber-Physical Systems = From Risk Modelling to Threat Counteraction /
by:
(Language materials, printed)
Cryptography and Coding = 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings /
by:
(Language materials, printed)
Information Security = 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Trends and Applications in Knowledge Discovery and Data Mining = PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14–17, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Database and Expert Systems Applications = 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings /
by:
(Language materials, printed)
IT-Sicherheit und Datenschutz im Gesundheitswesen = Leitfaden für Ärzte, Apotheker, Informatiker und Geschäftsführer in Klinik und Praxis /
by:
(Language materials, printed)
Machine Learning and Knowledge Discovery in Databases = European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part II /
by:
(Language materials, printed)
Smart Cities of Today and Tomorrow = Better Technology, Infrastructure and Security /
by:
(Language materials, printed)
Advances in Visual Computing = 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Critical Infrastructure Security and Resilience = Theories, Methods, Tools and Technologies /
by:
(Language materials, printed)
Wireless Internet = 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings /
by:
(Language materials, printed)
Testbeds and Research Infrastructures for the Development of Networks and Communities = 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings /
by:
(Language materials, printed)
Database Systems for Advanced Applications = DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedings /
by:
(Language materials, printed)
Information Systems Security = 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings /
by:
(Language materials, printed)
Cybercryptography: Applicable Cryptography for Cyberspace Security
by:
(Language materials, printed)
Oracle Database Application Security = With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager /
by:
(Language materials, printed)
Waging Cyber War = Technical Challenges and Operational Constraints /
by:
(Language materials, printed)
Cybersecurity in the Electricity Sector = Managing Critical Infrastructure /
by:
(Language materials, printed)
Industrial Control Systems Security and Resiliency = Practice and Theory /
by:
(Language materials, printed)
Advances in Visual Computing = 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Cyber Operations = Building, Defending, and Attacking Modern Computer Networks /
by:
(Language materials, printed)
Database and Expert Systems Applications = 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part II /
by:
(Language materials, printed)
Ad Hoc Networks = 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings /
by:
(Language materials, printed)
Security, Privacy, and Applied Cryptography Engineering = 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings /
by:
(Language materials, printed)
Intelligent Data Processing = 11th International Conference, IDP 2016, Barcelona, Spain, October 10–14, 2016, Revised Selected Papers /
by:
(Language materials, printed)
System Administration Ethics = Ten Commandments for Security and Compliance in a Modern Cyber World /
by:
(Language materials, printed)
Advances and Trends in Artificial Intelligence. From Theory to Practice = 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9–11, 2019, Proceedings /
by:
(Language materials, printed)
Smart Blockchain = Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedings /
by:
(Language materials, printed)
Mobile Internet Security = Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
by:
(Language materials, printed)
Ransomware Revealed = A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks /
by:
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings /
by:
(Language materials, printed)
Developing Applications with Azure Active Directory = Principles of Authentication and Authorization for Architects and Developers /
by:
(Language materials, printed)
Histories of Computing in Eastern Europe = IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Professional Red Teaming = Conducting Successful Cybersecurity Engagements /
by:
(Language materials, printed)
Information Technology for Peace and Security = IT Applications and Infrastructures in Conflicts, Crises, War, and Peace /
by:
(Language materials, printed)
Bug Bounty Hunting for Web Security = Find and Exploit Vulnerabilities in Web sites and Applications /
by:
(Language materials, printed)
The IoT Hacker's Handbook = A Practical Guide to Hacking the Internet of Things /
by:
(Language materials, printed)
PowerShell and Python Together = Targeting Digital Investigations /
by:
(Language materials, printed)
Advanced Hybrid Information Processing = Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part I /
by:
(Language materials, printed)
Frontiers in Cyber Security = Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings /
by:
(Language materials, printed)
Foundations of Security, Protocols, and Equational Reasoning = Essays Dedicated to Catherine A. Meadows /
by:
(Language materials, printed)
Pro Spring Security = Securing Spring Framework 5 and Boot 2-based Java Applications /
by:
(Language materials, printed)
Smart Grid and Internet of Things = Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings /
by:
(Language materials, printed)
Broadband Communications, Networks, and Systems = 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings /
by:
(Language materials, printed)
Big Data – BigData 2019 = 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings /
by:
(Language materials, printed)
Foundations and Practice of Security = 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers /
by:
(Language materials, printed)
Cyber-Sicherheit = Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung /
by:
(Language materials, printed)
Zero Trust Networks with VMware NSX = Build Highly Secure Network Architectures for Your Data Centers /
by:
(Language materials, printed)
Quick Start Guide to Penetration Testing = With NMAP, OpenVAS and Metasploit /
by:
(Language materials, printed)
Pro Azure Governance and Security = A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel /
by:
(Language materials, printed)
Solving Identity Management in Modern Applications = Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(Language materials, printed)
Future Network Systems and Security = 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings /
by:
(Language materials, printed)
Advances of Science and Technology = 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedings /
by:
(Language materials, printed)
Machine Learning and Knowledge Discovery in Databases = European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part I /
by:
(Language materials, printed)
Cognitive Radio Oriented Wireless Networks = 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedings /
by:
(Language materials, printed)
Computational Intelligence, Communications, and Business Analytics = Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part II /
by:
(Language materials, printed)
Digital Forensics and Cyber Crime = 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings /
by:
(Language materials, printed)
Context-Aware Systems and Applications, and Nature of Computation and Communication = 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedings /
by:
(Language materials, printed)
Quality, Reliability, Security and Robustness in Heterogeneous Systems = 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedings /
by:
(Language materials, printed)
Critical Infrastructure Protection XIII = 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers /
by:
(Language materials, printed)
Information Systems: Research, Development, Applications, Education = 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings /
by:
(Language materials, printed)
Industrial Networks and Intelligent Systems = 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings /
by:
(Language materials, printed)
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
by:
(Language materials, printed)
Show more
Fewer
Subjects