Computer security.
Overview
Works: | 758 works in 488 publications in 488 languages |
---|
Titles
Security engineering :a guide to building dependable distributed systems /
by:
(Language materials, printed)
Disaster management in telecommunications, broadcasting, and computer systems /
by:
(Language materials, printed)
Information security architecture :an integrated approach to security in the organization /
by:
(Language materials, printed)
Cryptography for Internet and database applications :developing secret and public key techniques with Java /
by:
(Language materials, printed)
How to break software security :effective techniques for security testing /
by:
(Language materials, printed)
Security in fixed and wireless networks :an introduction to securing data communications /
by:
(Language materials, printed)
Computer privacy annoyances :how to avoid the most annoying invasions of your personal and online privacy /
by:
(Language materials, printed)
Information security policies and actions in modern integrated systems /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography /
by:
(Language materials, printed)
Information security architecture :an integrated approach to security in the organization /
by:
(Language materials, printed)
Enterprise security :IT security solutions : concepts, practical experiences, technologies /
by:
(Language materials, printed)
Multimedia security :steganography and digital watermarking techniques for protection of intellectual property /
by:
(Language materials, printed)
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
(Language materials, printed)
The art of intrusion :the real stories behind the exploits of hackers, intruders & deceivers /
by:
(Language materials, printed)
Security in fixed and wireless networks an introduction to securing data communications /
by:
(Electronic resources)
19 deadly sins of software security :programming flaws and how to fix them /
by:
(Language materials, printed)
Applied cryptography :protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Desktop witness :the do's and don'ts of personal computer security /
by:
(Language materials, printed)
The shellcoder's handbook :discovering and exploiting security holes /
by:
(Language materials, printed)
Phishing and countermeasures :understanding the increasing problem of electronic identity theft /
by:
(Language materials, printed)
Machine learning and data mining for computer security :methods and applications /
by:
(Language materials, printed)
Web service security :scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 /
by:
(Language materials, printed)
Enterprise information systems assurance and system security :managerial and technical issues /
by:
(Language materials, printed)
Digital data integrity :the evolution from passive protection to active management /
by:
(Electronic resources)
Phishing and countermeasures :understanding the increasing problem of electronic identity theft /
by:
(Electronic resources)
The business case for network security :advocacy, governance, and ROI /
by:
(Language materials, printed)
Techniques and applications of digital watermarking and content protection /
by:
(Language materials, printed)
Securing Web services :practical usage of standards and specifications /
by:
(Language materials, printed)
Proceedings of The Ifip Tc 11 23rd International Information Security ConferenceIFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
(Electronic resources)
Information warfare in businessstrategies of control and resistance in the network society /
by:
(Electronic resources)
Public key infrastructurebuilding trusted applications and Web services /
by:
(Electronic resources)
Database and applications securityintegrating information security and data management /
by:
(Electronic resources)
Information security architecturean integrated approach to security in the organization /
by:
(Electronic resources)
Information securitydesign, implementation, measurement, and compliance /
by:
(Electronic resources)
Integrating security and software engineeringadvances and future visions /
by:
(Electronic resources)
The secure online business handbooka practical guide to risk management and business continuity /
by:
(Electronic resources)
Information security and ethicsconcepts, methodologies, tools and applications /
by:
(Electronic resources)
Hack the stackusing Snort and Ethereal to master the 8 layers of an insecure network /
by:
(Electronic resources)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Security engineering :a guide to building dependable distributed systems /
by:
(Language materials, printed)
Engineering secure software and systemsFirst international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Electronic resources)
Securing Windows server 2008prevent attacks from outside and inside your organization.
by:
(Electronic resources)
No tech hackinga guide to social engineering, dumpster diving, and shoulder surfing /
by:
(Electronic resources)
Security engineering with patternsorigins, theoretical models, and new applications /
by:
(Electronic resources)
Foundations of security analysis and design IIFOSAD 2001/2002 turorial lectures /
by:
(Electronic resources)
Querying databases privatelya new approach to private information retrieval /
by:
(Electronic resources)
Computer security, privacy, and politicscurrent issues, challenges, and solutions /
by:
(Electronic resources)
Information securitya manager's guide to thwarting data thieves and hackers /
by:
(Electronic resources)
Privacy in location-based applicationsresearch issues and emerging trends /
by:
(Electronic resources)
Digital watermarking and steganography :fundamentals and techniques /
by:
(Language materials, printed)
Multimedia security :digital image and video watermarking : HMM based transform domain watermarking in image & video /
by:
(Language materials, printed)
The web application hacker's handbook :discovering and exploiting security flaws /
by:
(Language materials, printed)
Malware :Computer virus, Computer worm, Trojan horse (computing), Rootkit, Backdoor (computing), Spyware, Keystroke logging, Botnet, Web threat, Dialer, Vulnerability (computing), World Wide Web /
by:
(Language materials, printed)
Gray hat Python :Python programming for hackers and reverse engineers /
by:
(Language materials, printed)
24 deadly sins of software security :programming flaws and how to fix them
by:
(Electronic resources)
Applied Oracle security :developing secure database and middleware environments
by:
(Electronic resources)
Hacking exposed malware & rootkits :malware & rootkits security secrets & solutions
by:
(Electronic resources)
VMware vSphere and virtual infrastructure security :securing the virtual environment /
by:
(Language materials, printed)
Statistical techniques for network security :modern statistically-based intrusion detection and protection /
by:
(Language materials, printed)
Essential computer securityeveryone's guide to e-mail, Internet, and wireless security /
by:
(Electronic resources)
State of the art in applied cryptographycourse on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /
by:
(Electronic resources)
Secure Internet programmingsecurity issues for mobile and distributed objects /
by:
(Electronic resources)
Secure networking - CQRE [Secure] '99International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings /
by:
(Electronic resources)
IT-security and privacydesign and use of privacy-enhancing security mechanisms /
by:
(Electronic resources)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Electronic resources)
Click, click, who's there?a family-based non-technical approach to help parents protect their children online /
by:
(Electronic resources)
Transactions on computational science Xspecial issue on security in computing, part I /
by:
(Electronic resources)
Hacking exposed malware & rootkits :malware & rootkits security secrets & solutions
by:
(Language materials, printed)
Software engineering for secure systemsindustrial and research perspectives /
by:
(Electronic resources)
Digital forensics for network, Internet, and cloud computinga forensic evidence guide for moving targets and data /
by:
(Electronic resources)
Virtualization and forensicsa digital forensic investigator's guide to virtual environments /
by:
(Electronic resources)
Securing the cloud :cloud computer security techniques and tactics /
by:
(Language materials, printed)
Preventing good people from doing bad thingsimplementing least privilege /
by:
(Electronic resources)
Privacy and accountability in the cloud :based on exploring private and accountable storage in distributed and dynamic environments /
by:
(Language materials, printed)
Cloud computing security :high-impact emerging technology - what you need to know : definitions, adoptions, impact, benefits, maturity, vendors /
by:
(Language materials, printed)
Cryptography and securityfrom theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Information security management metricsa definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurancenew technologies /
by:
(Electronic resources)
Situational awareness in computer network defenseprinciples, methods and applications /
by:
(Electronic resources)
Privacy protection measures and technologies in business organizationsaspects and standards /
by:
(Electronic resources)
Information assurance and security technologies for risk assessment and threat managementadvances /
by:
(Electronic resources)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(Electronic resources)
Data hidingexposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
Industrial network securitysecuring critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(Electronic resources)
Web application obfuscation-/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Hacking web appsdetecting and preventing web application security problems /
by:
(Electronic resources)
Windows registry forensicsadvanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
Network intrusion analysismethodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
The privacy engineer's manifestogetting from policy to code to QA to value /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(Electronic resources)
Trustworthy reconfigurable systemsenhancing the security capabilities of reconfigurable hardware architectures /
by:
(Electronic resources)
Platform embedded security technology revealedsafeguarding the future of computing with intel embedded security and management engine /
by:
(Electronic resources)
Advanced API securitysecuring APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
by:
(Electronic resources)
Defense against the black artshow hackers do what they do and how to protect against it /
by:
(Electronic resources)
Security de-engineeringsolving the problems in information risk management /
by:
(Electronic resources)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
Social media securityleveraging social networking while mitigating risk /
by:
(Electronic resources)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Collaboration with cloud computingsecurity, social media, and unified communications /
by:
(Electronic resources)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Privacy in a digital, networked worldtechnologies, implications and solutions /
by:
(Electronic resources)
International Conference on Security and Privacy in Communication Networks10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.Part I /
by:
(Electronic resources)
Advances in Digital Forensics XI11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(Electronic resources)
Cyber security and privacy4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Electronic resources)
Digital forensics and cyber crime7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection IX9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Electronic resources)
E-Democracy - citizen rights in the world of the new computing paradigms6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201520th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.Part II /
by:
(Electronic resources)
Technology and practice of passwordsInternational Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Electronic resources)
Decision and game theory for security6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Electronic resources)
Network and system security9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Electronic resources)
Mobile, secure, and programmable networkingfirst International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(Electronic resources)
Advanced concepts for intelligent vision systems16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Electronic resources)
Provable security9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security protocols XXIII23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Electronic resources)
Future data and security engineeringsecond International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Electronic resources)
Risk assessment and risk-driven testingthird International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(Electronic resources)
Secure IT systems20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201516th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Electronic resources)
Cryptology and network security14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Electronic resources)
Internet of vehicles - safe and intelligent mobilitysecond International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201521st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201521st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part II /
by:
(Electronic resources)
Cyber operationsbuilding, defending, and attacking modern computer networks /
by:
(Electronic resources)
Cryptography and coding15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Electronic resources)
Discrete dynamical systems and chaotic machines :theory and applications /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems
by:
(Electronic resources)
Transactions on computational science XXVIspecial issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
Cybersecurity in the European Unionresilience and adaptability in governance policy /
by:
(Electronic resources)
Smart card research and advanced applications14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Electronic resources)
Cyber security, cyber crime and cyber forensicsapplications and perspectives /
by:
(Electronic resources)
Advanced information systems engineering workshopsCAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016 : proceedings /
by:
(Electronic resources)
Cyber-physical attack recovery proceduresa step-by-step preparation and response guide /
by:
(Electronic resources)
Investigative computer forensicsthe practical guide for lawyers, accountants, investigators, and business executives /
by:
(Electronic resources)
Risk centric threat modelingprocess for attack simulation and threat analysis /
by:
(Electronic resources)
Security intelligencea practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
Safeguarding critical e-documentsimplementing a program for securing confidential information assets /
by:
(Electronic resources)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilitiesa guide to detection and prevention /
by:
(Electronic resources)
Decision and game theory for security7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
The second economythe race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
From hacking to report writingan introduction to security and penetration testing /
by:
(Electronic resources)
Concurrency, security, and puzzlesessays dedicated to Andrew William Roscoe on the occasion of his 60th birthday /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXXIspecial issue on data and security engineering /
by:
(Electronic resources)
Hardware security and trustdesign and deployment of integrated circuits in a threatened environment /
by:
(Electronic resources)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
Handbook of system safety and securitycyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /
by:
(Electronic resources)
Information security sciencemeasuring the vulnerability to data compromises /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics
by:
(Electronic resources)
Advanced persistent trainingtake your security awareness program to the next level /
by:
(Electronic resources)
Introduction to intelligent surveillancesurveillance data capture, transmission, and analytics /
by:
(Electronic resources)
Cyber security on Azurean IT professionals guide to Microsoft Azure security center /
by:
(Electronic resources)
Advances in digital forensics XIII13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Electronic resources)
Transactions on computational science XXXSpecial Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations /
by:
(Language materials, printed)
Building a HIPAA-compliant cybersecurity programusing NIST 800-30 and CSF to secure protected health information /
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
The Huawei and Snowden questionsCan electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations
by:
(Electronic resources)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Electronic resources)
Trusted digital circuitshardware trojan vulnerabilities, prevention and detection /
by:
(Electronic resources)
Physically unclonable functionsfrom basic design principles to advanced hardware security applications /
by:
(Electronic resources)
Building a corporate culture of securitystrategies for strengthening organizational resiliency /
by:
(Electronic resources)
The basics of digital privacysimple tools to protect your personal information and your identity online /
by:
(Electronic resources)
Big digital forensic data.Volume 2,Quick analysis for evidence and intelligence
by:
(Electronic resources)
Wireless algorithms, systems, and applications13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018 : proceedings /
by:
(Electronic resources)
Asset attack vectorsbuilding effective vulnerability management strategies to protect organizations /
by:
(Electronic resources)
Open source intelligence methods and toolsa practical guide to online intelligence /
by:
(Electronic resources)
Guide to vulnerability analysis for computer networks and systemsan artificial intelligence approach /
by:
(Electronic resources)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(Electronic resources)
Network intrusion detection using deep learninga feature learning approach /
by:
(Electronic resources)
Enhancing CBRNE safety & securityproceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats /
by:
(Electronic resources)
From database to cyber securityessays dedicated to Sushil Jajodia on the occasion of his 70th birthday /
by:
(Electronic resources)
Networked predictive control of systems with communication constraints and cyber attacks
by:
(Electronic resources)
Introduction to intelligent surveillancesurveillance data capture, transmission, and analytics /
by:
(Electronic resources)
Cyber operationsbuilding, defending, and attacking modern computer networks /
by:
(Electronic resources)
Guide to automotive connectivity and cybersecuritytrends, technologies, innovations and applications /
by:
(Electronic resources)
Professional Red teamingconducting successful cybersecurity engagements /
by:
(Electronic resources)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
by:
(Electronic resources)
The NICE cyber security frameworkcyber security intelligence and analytics /
by:
(Electronic resources)
Dynamic SQLapplications, performance, and security in Microsoft SQL server /
by:
(Electronic resources)
Human aspects of IT for the aged populationaging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.Part I /
by:
(Electronic resources)
Human aspects of IT for the aged populationaging, design and user experience : third International Conference, ITAP 2017, held as part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017 : proceedings.Part II /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Electronic resources)
From corporate security to commercial force :a business leader's guide to security economics /
by:
(Electronic resources)
Port cybersecurity :securing critical information infrastructures and supply chains /
by:
(Electronic resources)
Navigating new cyber riskshow businesses can plan, build and manage safe spaces in the digital age /
by:
(Electronic resources)
Cybersecurity and secure information systemschallenges and solutions in smart environments /
by:
(Electronic resources)
Trustworthy cyber-physical systemsa systematic framework towards design and evaluation of trust and trustworthiness /
by:
(Electronic resources)
Practical cyber forensicsan incident-based approach to forensic investigations /
by:
(Electronic resources)
Practical security properties on commodity computing platformsthe uber extensible micro-hypervisor framework /
by:
(Electronic resources)
System administration ethicsten commandments for security and compliance in a modern cyber world /
by:
(Electronic resources)
Recent trends and future technology in applied intelligence31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018 : proceedings /
by:
(Electronic resources)
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
by:
(Electronic resources)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(Electronic resources)
Building a cybersecurity culture in organizationshow to bridge the gap between people and digital technology /
by:
(Electronic resources)
Transactions on computational science XXXVIspecial issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
Binary code fingerprinting for cybersecurityapplication to malicious code fingerprinting /
by:
(Electronic resources)
Designing a HIPAA-compliant security operations centera guide to detecting and responding to healthcare breaches and events /
by:
(Electronic resources)
Identity attack vectorsimplementing an effective identity and access management solution /
by:
(Electronic resources)
Combating security challenges in the age of big datapowered by state-of-the-art artificial intelligence techniques /
by:
(Electronic resources)
Securing social identity in mobile platformstechnologies for for security, privacy and identity management /
by:
(Electronic resources)
Information security analyticsfinding security insights, patterns, and anomalies in big data /
by:
(Electronic resources)
The science and technology of counterterrorismmeasuring physical and electronic security risk /
by:
(Electronic resources)
Digital asset valuation and cyber risk measurementprinciples of cybernomics /
by:
(Electronic resources)
FinTechthe technology driving disruption in the financial services industry /
by:
(Electronic resources)
Countering cyber threats to financial institutionsa private and public partnership approach to critical lnfrastructure protection /
by:
(Electronic resources)
Rational cybersecurity for businessthe security leaders' guide to business alignment /
by:
(Electronic resources)
Artificial intelligence and security6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.Part I /
by:
(Electronic resources)
Artificial intelligence and security6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.Part II /
by:
(Electronic resources)
Artificial intelligence and security6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.Part III /
by:
(Electronic resources)
Security and trust management16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(Electronic resources)
Database systems for advanced applications25th International Conference, DASFAA 2020, Jeju, South Korea, September 24-27, 2020 : proceedings.Part III /
by:
(Electronic resources)
Algorithms and architectures for parallel processing20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.Part III /
by:
(Electronic resources)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(Electronic resources)
Malware analysis and detection engineeringa comprehensive approach to detect and analyze modern malware /
by:
(Electronic resources)
Cybersecurity in the electricity sectormanaging critical infrastructure /
by:
(Electronic resources)
The art of modelling computational systemsa journey from logic and concurrency to security and privacy : Essays dedicated to Catuscia Palamidessi on the occasion of her 60th birthday /
by:
(Electronic resources)
Beginning security with Microsoft technologiesprotecting Office 365, devices, and data /
by:
(Electronic resources)
Linking sensitive datamethods and techniques for practical privacy-preserving information sharing /
by:
(Electronic resources)
Logic, language, and securityessays dedicated to Andre Scedrov on the occasion of his 65th birthday /
by:
(Electronic resources)
Visual privacy managementdesign and applications of a privacy-enabling platform /
by:
(Electronic resources)
Cross-layer design for secure and resilient cyber-physical systemsa decision and game theoretic approach /
by:
(Electronic resources)
Cyber security17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(Electronic resources)
Data privacy and trust in cloud computingbuilding trust in the cloud through assurance and accountability /
by:
(Electronic resources)
A complete guide to Burp Suitelearn to detect application vulnerabilities /
by:
(Electronic resources)
Red Hat and IT securitywith Red Hat Ansible, Red Hat OpenShift, and Red Hat security auditing /
by:
(Electronic resources)
Machine intelligence and big data analytics for cybersecurity applications
by:
(Electronic resources)
Authentication and access controlpractical cryptography methods and tools /
by:
(Electronic resources)
Cyber security on Azurean it professional's guide to Microsoft Azure security /
by:
(Electronic resources)
Building decentralized trustmultidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(Electronic resources)
The theory of hash functions and random oraclesan approach to modern cryptography /
by:
(Electronic resources)
Blockchain technology and applicationthird CCF China blockchain conference, CBCC 2020, Jinan, China, December 18-20, 2020 : revised selected papers /
by:
(Electronic resources)
Internet of Things and access controlsensing, monitoring and controlling access in IoT-enabled healthcare systems /
by:
(Electronic resources)
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
by:
(Electronic resources)
Artificial intelligence and blockchain for future cybersecurity applications
by:
(Electronic resources)
Protective securitycreating military-grade defenses for your digital business /
by:
(Electronic resources)
Artificial intelligence for cyber securitymethods, issues and possible horizons or opportunities /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Android software internals quick referencea field manual and security reference guide to Java-based Android components /
by:
(Electronic resources)
Data breach preparation and responsebreaches are certain, impact is not /
by:
(Electronic resources)
Advanced persistent securitya cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
by:
(Electronic resources)
Android malware detection using machine learningdata-driven fingerprinting and threat intelligence /
by:
(Electronic resources)
Choose your InfoSec pathan interactive cybersecurity adventure for beginners /
by:
(Electronic resources)
Improving information security practices through computational intelligence
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems
by:
(Electronic resources)
Understanding cybersecurity management in FinTechchallenges, strategies, and trends /
by:
(Electronic resources)
Tribe of hackers, security leaderstribal knowledge from the best in cybersecurity leadership /
by:
(Electronic resources)
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
by:
(Electronic resources)
Cyber threat intelligencethe no-nonsense guide for CISOs and Security Managers /
by:
(Electronic resources)
Azure security handbooka comprehensive guide for defending your enterprise environment /
by:
(Electronic resources)
Computer security and the internettools and jewels from malware to bitcoin /
by:
(Electronic resources)
Introduction to privacy enhancing technologiesa classification-based approach to understanding PETs /
by:
(Electronic resources)
The next era in hardware securitya perspective on emerging technologies for secure electronics /
by:
(Electronic resources)
Reinforcement learning for cyber-physical systems with cybersecurity case studies /
by:
(Electronic resources)
Artificial intelligence in cyber security: impact and implicationssecurity challenges, technical and ethical issues, forensic investigative challenges /
by:
(Electronic resources)
Artificial intelligence and its contextssecurity, business and governance /
by:
(Electronic resources)
Cyber crisis managementthe practical handbook on crisis management and crisis communication /
by:
(Electronic resources)
Phishing and communication channelsa guide to identifying and mitigating phishing attacks /
by:
(Electronic resources)
Blockchain and other emerging technologies for digital business strategies
by:
(Electronic resources)
Guide to differential privacy modificationsa taxonomy of variants and extensions /
by:
(Electronic resources)
Cybersecurity of digital service chainschallenges, methodologies, and tools /
by:
(Electronic resources)
Towards an increased securitygreen innovations, intellectual property protection and information security /
by:
(Electronic resources)
Explainable artificial intelligence for cyber securitynext generation artificial intelligence /
by:
(Electronic resources)
The definitive guide to security in Jakarta EEsecuring Java-based enterprise applications with Jakarta security, authorization, authentication and more /
by:
(Electronic resources)
Cryptography and cryptanalysis in Javacreating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(Electronic resources)
Snowflake access controlmastering the features for data privacy and regulatory compliance /
by:
(Electronic resources)
Strategy, leadership, and AI in the cyber ecosystemthe role of digital societies in information governance and decision making /
by:
(Electronic resources)
Security and resilience in intelligent data-centric systems and communication networks
by:
(Electronic resources)
You can stop stupidstopping losses from accidental and malicious actions /
by:
(Electronic resources)
Intelligent security systemshow artificial intelligence, machine learning and data science work for and against computer security /
by:
(Electronic resources)
Security compliance in model-driven development of software systems in presence of long-term evolution and variants
by:
(Electronic resources)
Security and resilience in cyber-physical systemsdetection, estimation and control /
by:
(Electronic resources)
Citizen privacy frameworkcase of a fuzzy-based recommender system for political participation /
by:
(Electronic resources)
Security issues in fog computing from 5G to 6Garchitectures, applications and solutions /
by:
(Electronic resources)
IoT system testingan IoT journey from devices to analytics and the edge /
by:
(Electronic resources)
Modern cryptographyapplied mathematics for encryption and information security /
by:
(Electronic resources)
Understanding cybersecurity management in decentralized financechallenges, strategies, and trends /
by:
(Electronic resources)
Handbook of biometric anti-spoofingpresentation attack detection and vulnerability assessment /
by:
(Electronic resources)
Firewalls don't stop dragonsa step-by-step guide to computer security and privacy for non-techies /
by:
(Electronic resources)
Fundamentals of information securitya complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Modern cybersecurity strategies for enterprisesprotect and secure your enterprise networks, digital business assets, and endpoint security with tested and proven methods /
by:
(Electronic resources)
An introduction to secret sharinga systematic overview and guide for protocol selection /
by:
(Electronic resources)
Emerging ICT technologies and cybersecurityfrom AI and ML to other futuristic technologies /
by:
(Electronic resources)
Guide to cybersecurity in digital transformationtrends, methods, technologies, applications and best practices /
by:
(Electronic resources)
The NICE cyber security frameworkcyber security intelligence and analytics /
by:
(Electronic resources)
Security, trust and privacy models, and architectures in IoT environments
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity
by:
(Electronic resources)
Deep learning for computational problems in hardware securitymodeling attacks on strong physically unclonable function circuits /
by:
(Electronic resources)
Predictive data security using AIinsights and issues of blockchain, IoT, and DevOps /
by:
(Electronic resources)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2 /
by:
(Electronic resources)
Azure security for critical workloadsimplementing modern security controls for authentication, authorization and auditing /
by:
(Electronic resources)
Safety in the digital agesociotechnical perspectives on algorithms and machine learning /
by:
(Electronic resources)
Demystifying intelligent multimode security systemsan edge-to-cloud cybersecurity solutions guide /
by:
(Electronic resources)
Applications for artificial intelligence and digital forensics in national security
by:
(Electronic resources)
Discovering cybersecuritya technical introduction for the absolute beginner /
by:
(Electronic resources)
Show more
Fewer
Subjects