Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 109
- Information technology: general issues 22
- Network hardware 16
- Computer networking & communications 15
- Artificial intelligence 14
- Coding theory & cryptology 14
- Network security 12
- Information retrieval 10
- Business mathematics & systems 8
- Computer vision 8
- Software Engineering 8
- Crime & criminology 7
- Algorithms & data structures 6
- Legal aspects of IT 6
- Systems analysis & design 6
- Communications engineering / telecommunications 5
- Electrical engineering 5
- Computer science 4
- Data mining 4
- Databases 4
- Digital lifestyle 4
- Finance 4
- Imaging systems & technology 4
- International relations 4
- Pattern recognition 4
- Privacy & data protection 4
- Security & fire alarm systems 4
- Ethical & social aspects of IT 3
- Management & management techniques 3
- Mathematical theory of computation 3
-
21
Deterrence in the 21st Century Statecraft in the Information Age
Published 2024Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
22
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Published 2020Subjects: “…Computer security…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
23
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Published 2020Subjects: “…Computer security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
24
Deterrence in the 21st Century Statecraft in the Information Age
Published 2024Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
25
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents RAND Counterinsurgency StudyA-Volume 1
Published 2007Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
26
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Published 2022Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
27
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Published 2022Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
28
Getting to Yes with China in Cyberspace
Published 2016Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
29
A Cyberworm that Knows No Boundaries
Published 2011Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
30
Crisis and Escalation in Cyberspace
Published 2012Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
31
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Published 2016Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
32
Cyberdeterrence and Cyberwar
Published 2009Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
33
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Published 2019Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
34
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Published 2019Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
35
Internet Freedom Software and Illicit Activity Supporting Human Rights Without Enabling Criminals
Published 2015Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
36
Social Engineering How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication
Published 2022Subjects: “…Computer security…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
37
Data Privacy for the Smart Grid
Published 2015Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
38
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment
Published 2020Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
39
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment
Published 2020Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
40
The Coupling of Safety and Security Exploring Interrelations in Theory and Practice /
Published 2020Subjects: “…Computer security.…”
Link to Metadata
Electronic eBook