Title: Multimedia Forensics, Author: Husrev Taha Sencar
Title: Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Author: Flemming Nielson
Title: Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment, Author: Dan Blum
Title: Unauthorized Access: The Crisis in Online Privacy and Security, Author: Robert Sloan
Title: Hackercool Dec 2016, Author: kalyan chinta
#3 in Series
Title: Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling, Author: Julius Holderer
Title: Cyber Risk: Managing Uncertainty in a Digital World, Author: Tim Stevens Pre-Order Now
Title: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, Author: Will Arthur
Title: Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Author: Xiaoyu Ruan
Title: Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers, Author: Wei Lu
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Author: Lujo Bauer
Title: Trends in Data Protection and Encryption Technologies, Author: Valentin Mulder
Title: Data Privacy: What Enterprises Need to Know?, Author: Deepak Gupta
Title: Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence, Author: Claudia Lanza
Title: Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers, Author: Wei Lu
Title: Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Author: Jesse Varsalone
Title: Managing Risk and Information Security: Protect to Enable, Author: Malcolm W. Harkins
Title: Challenges in Cybersecurity and Privacy - the European Research Landscape, Author: Jorge Bernal Bernabe
Title: Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, Author: Luis Bathen

Pagination Links