Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 20
- Cryptography 18
- Data and Information Security 16
- Data protection 16
- History of engineering & technology 15
- Computer networking & communications 13
- Cryptology 13
- Data encryption (Computer science) 13
- Coding theory & cryptology 12
- Artificial intelligence 11
- Computer science 11
- Network security 11
- Software Engineering 10
- Computer networks 9
- Information retrieval 9
- Technology: general issues 9
- Applied mathematics 8
- Computer Communication Networks 8
- Mathematics 8
- Network hardware 8
- Legal aspects of IT 6
- Research & information: general 6
- Application software 5
- Computer and Information Systems Applications 5
- Information theory 5
- Mathematical theory of computation 5
- Computer networks 4
- Computing & information technology 4
- Information technology industries 4
- Information technology: general issues 4
-
41
A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security /
Published 2015Subjects: Link to Metadata
Electronic eBook -
42
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: Link to Metadata
Electronic eBook -
43
The InfoSec Handbook An Introduction to Information Security /
Published 2014Subjects: Link to Metadata
Electronic eBook -
44
Trends in Data Protection and Encryption Technologies
Published 2023Subjects: Link to Metadata
Electronic eBook -
45
Cryptographic City Decoding the Smart Metropolis
Published 2023Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
46
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War
Published 2013Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
47
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War
Published 2013Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
48
Mistrust -- Ethnographic Approximations
Published 2018Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
49
Mistrust -- Ethnographic Approximations
Published 2018Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
50
Recent Advances in Industrial and Applied Mathematics
Published 2022Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
51
Recent Advances in Industrial and Applied Mathematics
Published 2022Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
52
Security of Ubiquitous Computing Systems Selected Topics
Published 2021Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
53
Security of Ubiquitous Computing Systems Selected Topics
Published 2021Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
54
-
55
Electronic Voting 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings /
Published 2022Subjects: “…Cryptography.…”
Link to Metadata
Electronic eBook -
56
Electronic Voting 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings /
Published 2023Subjects: “…Cryptography.…”
Link to Metadata
Electronic eBook -
57
Cyber Security 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers /
Published 2022Subjects: Link to Metadata
Electronic eBook -
58
Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice...
Published 2018Subjects: “…cryptography…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
59
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
Published 2020Table of Contents: “…Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.…”
Link to Metadata
Electronic eBook -
60