Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 109
- Information technology: general issues 22
- Network hardware 16
- Computer networking & communications 15
- Artificial intelligence 14
- Coding theory & cryptology 14
- Network security 12
- Information retrieval 10
- Business mathematics & systems 8
- Computer vision 8
- Software Engineering 8
- Crime & criminology 7
- Algorithms & data structures 6
- Legal aspects of IT 6
- Systems analysis & design 6
- Communications engineering / telecommunications 5
- Electrical engineering 5
- Computer science 4
- Data mining 4
- Databases 4
- Digital lifestyle 4
- Finance 4
- Imaging systems & technology 4
- International relations 4
- Pattern recognition 4
- Privacy & data protection 4
- Security & fire alarm systems 4
- Ethical & social aspects of IT 3
- Management & management techniques 3
- Mathematical theory of computation 3
-
81
International Symposium on Mathematics, Quantum Theory, and Cryptography Proceedings of MQC 2019
Published 2021Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
82
International Symposium on Mathematics, Quantum Theory, and Cryptography Proceedings of MQC 2019
Published 2021Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
83
Handbook of Digital Face Manipulation and Detection From DeepFakes to Morphing Attacks
Published 2022Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
84
Handbook of Digital Face Manipulation and Detection From DeepFakes to Morphing Attacks
Published 2022Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
85
Data Privacy and Trust in Cloud Computing Building trust in the cloud through assurance and accountability
Published 2021Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
86
Security of Ubiquitous Computing Systems Selected Topics
Published 2021Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
87
Data Privacy and Trust in Cloud Computing Building trust in the cloud through assurance and accountability
Published 2021Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
88
Security of Ubiquitous Computing Systems Selected Topics
Published 2021Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
89
The Coupling of Safety and Security Exploring Interrelations in Theory and Practice
Published 2020Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
90
The Coupling of Safety and Security Exploring Interrelations in Theory and Practice
Published 2020Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
91
Data Spaces Design, Deployment and Future Directions
Published 2022Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
92
Data Spaces Design, Deployment and Future Directions
Published 2022Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
93
Information Security Governance Simplified From the Boardroom to the Keyboard
Published 2011Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
94
Information Security Governance Simplified From the Boardroom to the Keyboard
Published 2011Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
95
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
Published 2018Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
96
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
Published 2018Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
97
e-Services
Published 2021Subjects: “…entrepreneurship, cloud computing, security, corruption, e-learning, e-commerce…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
98
Defense against the Black Arts How Hackers Do What They Do and How to Protect against It
Published 2012Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
99
Defense against the Black Arts How Hackers Do What They Do and How to Protect against It
Published 2012Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
100
Multimedia Forensics
Published 2022Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter