1 |
|
Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits [E-Book]
|
Peeters, Eric
|
2013 |
|
.
|
2 |
|
Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings [E-Book]
|
|
2017 |
500256180
|
.
|
3 |
|
Apple's iPad im Enterprise-Einsatz: Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen [E-Book]
|
Oelmaier, Florian
|
2011 |
|
.
|
4 |
|
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [E-Book]
|
|
2017 |
500255484
|
.
|
5 |
|
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt [E-Book]
|
Steffens, Timo
|
2018 |
|
.
|
6 |
|
Automotive Cybersecurity: Security-Bausteine für Automotive Embedded Systeme [E-Book]
|
Wurm, Manuel
|
2022 |
|
.
|
7 |
|
Bankaufsichtliche Anforderungen an die IT (BAIT) Konzepte zur Implementierung der neuen Vorgaben [E-Book]
|
Maksimovic, Tomislav
|
2019 |
|
.
|
8 |
|
Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit [E-Book]
|
Bub, Udo
|
2014 |
|
.
|
9 |
|
Beschaffung unter Berücksichtigung der IT-Sicherheit: Wichtigkeit, Herausforderungen und Maßnahmen [E-Book]
|
Piller, Ernst
|
2017 |
|
.
|
10 |
|
Betriebssysteme: Grundlagen und Konzepte [E-Book]
|
Brause, Rüdiger W.
|
2017 |
|
.
|
11 |
|
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations [E-Book]
|
Hassanien, Aboul Ella
|
2014 |
|
.
|
12 |
|
Bring your own Device: Einsatz von privaten Endgeräten im beruflichen Umfeld – Chancen, Risiken und Möglichkeiten [E-Book]
|
Kohne, Andreas
|
2015 |
|
.
|
13 |
|
Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I [E-Book]
|
|
2017 |
500258160
|
.
|
14 |
|
Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II [E-Book]
|
|
2017 |
500268034
|
.
|
15 |
|
Computational Intelligence for Privacy and Security [E-Book]
|
Elizondo, David A.
|
2012 |
|
.
|
16 |
|
Computational Intelligence in Information Assurance and Security [E-Book]
|
|
2007 |
|
.
|
17 |
|
Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings [E-Book]
|
Herrero, Álvaro
|
2009 |
|
.
|
18 |
|
Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) [E-Book]
|
Herrero, Álvaro
|
2010 |
|
.
|
19 |
|
Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen [E-Book]
|
Kebschull, Udo
|
2023 |
|
.
|
20 |
|
Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings [E-Book]
|
|
2017 |
500256195
|
.
|