Title: Cyber Risk: Managing Uncertainty in a Digital World, Author: Tim Stevens Pre-Order Now
Title: Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, Author: Luis Bathen
Title: Electronic Voting: 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings, Author: David Duenas-Cid
Title: Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Author: Flemming Nielson
Title: The InfoSec Handbook: An Introduction to Information Security, Author: Umesha Nayak
Title: Managing Risk and Information Security: Protect to Enable, Author: Malcolm W. Harkins
Title: Preparing for Digital Disruption, Author: Erik Schrijvers
Title: Multimedia Forensics, Author: Husrev Taha Sencar
Title: Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Author: Xiaoyu Ruan
Title: Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Author: Lujo Bauer
Title: Security of Ubiquitous Computing Systems: Selected Topics, Author: Gildas Avoine
Title: Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling, Author: Julius Holderer
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings, Author: Robert Krimmer
Title: Schwachstellenanalyse & Reverse Engineering von Android Apps, Author: Daniel Szameitat
Title: Digitale Identitäten und Nachweise: Lösungsansätze für vertrauenswürdige Interaktionen zwischen Menschen, Unternehmen und Verwaltung, Author: Jürgen Anke
Title: Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment, Author: Dan Blum
Title: Easy Password Creation Systems For Life (Introduction), Author: Josephine Rosenburgh
Title: Hackercool Dec 2016, Author: kalyan chinta
#3 in Series
Title: Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters, Author: William Futral

Pagination Links