Title: Schwachstellenanalyse & Reverse Engineering von Android Apps, Author: Daniel Szameitat
Title: Electronic Voting: 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings, Author: David Duenas-Cid
Title: How to Become Anonymous, Secure and Free Online, Author: Amy Awol
Title: Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers, Author: Xiaochun Yun
Title: Challenges in Cybersecurity and Privacy - the European Research Landscape, Author: Jorge Bernal Bernabe
Title: Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence, Author: Claudia Lanza
Title: Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters, Author: William Futral
Title: Cyber Risk: Managing Uncertainty in a Digital World, Author: Tim Stevens Pre-Order Now
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers, Author: Erol Gelenbe
Title: Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, Author: Luis Bathen
Title: Preparing for Digital Disruption, Author: Erik Schrijvers
Title: Security in Distributed, Grid, Mobile, and Pervasive Computing, Author: Yang Xiao
Title: Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Author: Lujo Bauer
Title: Multimedia Forensics, Author: Husrev Taha Sencar
Title: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, Author: Will Arthur
Title: Hackercool Dec 2016, Author: kalyan chinta
#3 in Series
Title: Data Privacy: What Enterprises Need to Know?, Author: Deepak Gupta
Title: Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Author: Flemming Nielson
Title: How Not To Use Your Smartphone, Author: Rodney D. Cambridge

Pagination Links