Title: Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling, Author: Julius Holderer
Title: Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers, Author: Erol Gelenbe
Title: Preparing for Digital Disruption, Author: Erik Schrijvers
Title: Cyber Risk: Managing Uncertainty in a Digital World, Author: Tim Stevens Pre-Order Now
Title: Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Author: Xiaoyu Ruan
Title: Usable Security und Privacy by Design, Author: Hartmut Schmitt
Title: Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Author: Jesse Varsalone
Title: Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings, Author: Melanie Volkamer
Title: Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters, Author: William Futral
Title: Schwachstellenanalyse & Reverse Engineering von Android Apps, Author: Daniel Szameitat
Title: Security in Distributed, Grid, Mobile, and Pervasive Computing, Author: Yang Xiao
Title: Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Author: Flemming Nielson
Title: Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers, Author: Wei Lu
Title: Trends in Data Protection and Encryption Technologies, Author: Valentin Mulder
Title: Easy Password Creation Systems For Life (Introduction), Author: Josephine Rosenburgh
Title: The InfoSec Handbook: An Introduction to Information Security, Author: Umesha Nayak
Title: How Not To Use Your Smartphone, Author: Rodney D. Cambridge
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Multimedia Forensics, Author: Husrev Taha Sencar
Title: A Best Practices Guide for Comprehensive Employee Awareness Programs, Author: Tom Pendergast

Pagination Links