Ohcanbohtosat - "computer security"
Fáddáevttohusat
Fáddáevttohusat
- Computer security 109
- Information technology: general issues 22
- Computer networking & communications 17
- Network hardware 16
- Artificial intelligence 14
- Coding theory & cryptology 14
- Network security 12
- Information retrieval 10
- Software Engineering 9
- Business mathematics & systems 8
- Computer vision 8
- Crime & criminology 7
- Algorithms & data structures 6
- Data mining 6
- Legal aspects of IT 6
- Systems analysis & design 6
- Communications engineering / telecommunications 5
- Computer science 5
- Electrical engineering 5
- Databases 4
- Digital lifestyle 4
- Finance 4
- Games development & programming 4
- Imaging systems & technology 4
- International relations 4
- Pattern recognition 4
- Privacy & data protection 4
- Security & fire alarm systems 4
- Ethical & social aspects of IT 3
- History of engineering & technology 3
-
21
Handbook of Vascular Biometrics
Almmustuhtton 2020Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
22
Handbook of Vascular Biometrics
Almmustuhtton 2020Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi -
23
Case Kritis - Fallstudien zur IT-Sicherheit in Kritischen Infrastrukturen
Almmustuhtton 2018Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
24
Deterrence in the 21st Century Statecraft in the Information Age
Almmustuhtton 2024Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
25
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Almmustuhtton 2020Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
26
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment
Almmustuhtton 2020Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi -
27
Deterrence in the 21st Century Statecraft in the Information Age
Almmustuhtton 2024Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi -
28
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents RAND Counterinsurgency StudyA-Volume 1
Almmustuhtton 2007Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
29
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Almmustuhtton 2022Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
30
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Almmustuhtton 2022Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi -
31
Getting to Yes with China in Cyberspace
Almmustuhtton 2016Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
32
A Cyberworm that Knows No Boundaries
Almmustuhtton 2011Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
33
Crisis and Escalation in Cyberspace
Almmustuhtton 2012Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
34
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Almmustuhtton 2016Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
35
Cyberdeterrence and Cyberwar
Almmustuhtton 2009Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
36
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Almmustuhtton 2019Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
37
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Cze...
Almmustuhtton 2019Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi -
38
Internet Freedom Software and Illicit Activity Supporting Human Rights Without Enabling Criminals
Almmustuhtton 2015Fáttát: “…Computer security bicssc…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
39
Social Engineering How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication
Almmustuhtton 2022Fáttát: “…Computer security…”
DOAB: download the publication
DOAB: description of the publication
Elektrovnnalaš Girjji oassi -
40
Data Privacy for the Smart Grid
Almmustuhtton 2015Fáttát: “…Computer security bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektrovnnalaš Girjji oassi