Zoekresultaten - "cyber security"
Gesuggereerde onderwerpen binnen jouw zoekopdracht.
Gesuggereerde onderwerpen binnen jouw zoekopdracht.
- Computer security 10
- International relations 8
- Crime & criminology 6
- Legal aspects of IT 6
- Technology: general issues 6
- Warfare & defence 6
- Computer science 5
- Diplomacy 4
- International institutions 4
- Military history 4
- Political control & freedoms 4
- Political structure & processes 4
- Public administration 4
- Computer networking & communications 3
- History of engineering & technology 3
- Artificial intelligence 2
- Business mathematics & systems 2
- Digital lifestyle 2
- Energy technology & engineering 2
- Environmental economics 2
- Espionage & secret services 2
- Ethical & social aspects of IT 2
- Ethics & moral philosophy 2
- Human-computer interaction 2
- Information architecture 2
- Information retrieval 2
- Information technology industries 2
- Information technology: general issues 2
- Management & management techniques 2
- Network hardware 2
-
21
Understanding the Creeping Crisis
Gepubliceerd in 2021Onderwerpen: “…cyber security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
22
Preparing for Digital Disruption
Gepubliceerd in 2021Onderwerpen: “…Cyber Security Policy…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
23
Biometric Identification, Law and Ethics
Gepubliceerd in 2021Onderwerpen: “…Cyber Security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
24
Preparing for Digital Disruption
Gepubliceerd in 2021Onderwerpen: “…Cyber Security Policy…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
25
Biometric Identification, Law and Ethics
Gepubliceerd in 2021Onderwerpen: “…Cyber Security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
26
Advanced Digital Auditing Theory and Practice of Auditing Complex Information Systems and Technologies
Gepubliceerd in 2023Onderwerpen: “…Cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
27
Advanced Digital Auditing Theory and Practice of Auditing Complex Information Systems and Technologies
Gepubliceerd in 2023Onderwerpen: “…Cyber security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
28
The Palgrave Handbook of International Energy Economics
Gepubliceerd in 2022Onderwerpen: “…Cyber-security in energy…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
29
The Palgrave Handbook of International Energy Economics
Gepubliceerd in 2022Onderwerpen: “…Cyber-security in energy…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
30
Cyber Security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Gepubliceerd in 2022Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
31
Cyber Security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Gepubliceerd in 2022Onderwerpen: “…cyber security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
32
Cybersecurity Issues in Smart Grids and Future Power Systems
Gepubliceerd in 2023Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
33
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Gepubliceerd in 2018Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
34
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Gepubliceerd in 2022Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
35
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Gepubliceerd in 2018Onderwerpen: “…cyber security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
36
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Gepubliceerd in 2022Onderwerpen: “…cyber security…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Elektronisch Hoofdstuk -
37
Design Space Exploration and Resource Management of Multi/Many-Core Systems
Gepubliceerd in 2021Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
38
Advances on Smart Cities and Smart Buildings
Gepubliceerd in 2022Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
39
Computational Methods for Medical and Cyber Security
Gepubliceerd in 2022Onderwerpen: “…cyber-security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk -
40
Electrification of Smart Cities
Gepubliceerd in 2023Onderwerpen: “…cyber security…”
DOAB: download the publication
DOAB: description of the publication
Elektronisch Hoofdstuk