Title: Usable Security und Privacy by Design, Author: Hartmut Schmitt
Title: Trends in Data Protection and Encryption Technologies, Author: Valentin Mulder
Title: The InfoSec Handbook: An Introduction to Information Security, Author: Umesha Nayak
Title: Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, Author: Luis Bathen
Title: Security of Ubiquitous Computing Systems: Selected Topics, Author: Gildas Avoine
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Security in Distributed, Grid, Mobile, and Pervasive Computing, Author: Yang Xiao
Title: Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers, Author: Erol Gelenbe
Title: Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Author: Erol Gelenbe
Title: Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment, Author: Dan Blum
Title: Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence, Author: Claudia Lanza
Title: Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Author: Flemming Nielson
Title: Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Author: Lujo Bauer
Title: Preparing for Digital Disruption, Author: Erik Schrijvers
Title: Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Author: Xiaoyu Ruan
Title: Online Safety: Scams, SPAM, Viruses and Clouds, Author: A. M. Perry
Title: Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling, Author: Julius Holderer
Title: Multimedia Forensics, Author: Husrev Taha Sencar
Title: Mastering Cybersecurity Interviews, Author: Taimur Ijlal
Title: Managing Risk and Information Security: Protect to Enable, Author: Malcolm W. Harkins

Pagination Links