Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 108
- Information technology: general issues 22
- Computer networking & communications 17
- Network hardware 16
- Artificial intelligence 14
- Coding theory & cryptology 14
- Network security 12
- Information retrieval 10
- Business mathematics & systems 8
- Computer vision 8
- Software Engineering 8
- Crime & criminology 7
- Algorithms & data structures 6
- Data mining 6
- Legal aspects of IT 6
- Systems analysis & design 6
- Communications engineering / telecommunications 5
- Computer science 5
- Electrical engineering 5
- Databases 4
- Digital lifestyle 4
- Finance 4
- Games development & programming 4
- Imaging systems & technology 4
- International relations 4
- Pattern recognition 4
- Privacy & data protection 4
- Security & fire alarm systems 4
- Ethical & social aspects of IT 3
- History of engineering & technology 3
-
21
Handbook of Vascular Biometrics
Published 2020Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
22
Deterrence in the 21st Century Statecraft in the Information Age
Published 2024Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
23
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Published 2020Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
24
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Published 2020Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
25
Deterrence in the 21st Century Statecraft in the Information Age
Published 2024Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
26
Case Kritis - Fallstudien zur IT-Sicherheit in Kritischen Infrastrukturen
Published 2018Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
27
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents RAND Counterinsurgency StudyA-Volume 1
Published 2007Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
28
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Published 2022Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
29
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Published 2022Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
30
Getting to Yes with China in Cyberspace
Published 2016Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
31
A Cyberworm that Knows No Boundaries
Published 2011Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
32
Crisis and Escalation in Cyberspace
Published 2012Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
33
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Published 2016Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
34
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Published 2019Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
35
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Published 2019Subjects: OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
36
Cyberdeterrence and Cyberwar
Published 2009Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
37
Internet Freedom Software and Illicit Activity Supporting Human Rights Without Enabling Criminals
Published 2015Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
38
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment
Published 2020Subjects: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
39
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment
Published 2020Subjects: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
40
Social Engineering How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication
Published 2022Subjects: DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter