Title: Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions, Author: Paul Rohmeyer
Title: Bancomat Bitcoin: Esplorando il mondo delle transazioni in criptovaluta e della privacy, Author: Fouad Sabry
Title: Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II, Author: Xingming Sun
Title: Public-Key Cryptography - PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025, Proceedings, Part V, Author: Tibor Jager
Title: Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers, Author: Matthew Bernhard
Title: Building an Effective Security Program, Author: Chris Williams
Title: Intelligent Mobile Malware Detection, Author: Tony Thomas
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: Information Security and Cryptology - ICISC 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers, Author: Howon Kim
Title: Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, Author: Miroslaw Kutylowski
Title: Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis, Author: Shivi Garg
Title: Advances in Cryptology - CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II, Author: Helena Handschuh
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Authentication Codes and Combinatorial Designs, Author: Dingyi Pei
Title: The Cybersecurity Framework - DRAFT NISTIR 8170: Implementation Guidance for Federal Agencies, Author: National Instituteof Standards
Title: An Information Security Handbook, Author: John M. Hunter
Title: Code-Based Cryptography: 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers, Author: Andre Esser
Title: Survivre sur Internet: Ne subissez plus Internet mais domptez la bete, Author: Roosvelt ESSONO
Title: Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilities, Author: Sagar Rahalkar
Title: Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats, Author: Scott E. Donaldson

Pagination Links