1 |
|
50 Jahre Universitäts-Informatik in München [E-Book]
|
|
2017 |
|
.
|
2 |
|
Accelerating DevSecOps on AWS: create secure CI/CD pipelines using Chaos and AIOps [E-Book]
|
Swaraj, Nikit
|
2022 |
|
.
|
3 |
|
Advanced Computing and Systems for Security: Volume 1 [E-Book]
|
|
2016 |
|
.
|
4 |
|
Advanced Computing and Systems for Security: Volume 2 [E-Book]
|
|
2016 |
|
.
|
5 |
|
Advanced Research in Data Privacy [E-Book]
|
Navarro-Arribas, Guillermo
|
2015 |
|
.
|
6 |
|
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
|
.
|
7 |
|
Advances in Digital Forensics XVIII: 18th IFIP WG 11.9 International Conference, Virtual Event, January 3–4, 2022, Revised Selected Papers [E-Book]
|
|
2022 |
|
.
|
8 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA [E-Book]
|
|
2016 |
|
.
|
9 |
|
Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings [E-Book]
|
|
2017 |
500256180
|
.
|
10 |
|
Agile security operations: Engineering for agility in cyber defense, detection, and response [E-Book]
|
Hettema, Hinne
|
2022 |
|
.
|
11 |
|
Aligning security operations with the MITRE ATT&CK framework: level up your security operations center for better security [E-Book]
|
Blair, Rebecca
|
2023 |
|
.
|
12 |
|
An ethical guide to cyber anonymity: concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments [E-Book]
|
Gunawardana, Kushantha
|
2022 |
|
.
|
13 |
|
Antivirus bypass techniques: learn practical techniques and tactics to combat, bypass, and evade antivirus software [E-Book]
|
Yehoshua, Nir
|
2021 |
|
.
|
14 |
|
API analytics for product managers: understand key API metrics that can help you grow your business [E-Book]
|
Goyal, Deepa
|
2024 |
|
.
|
15 |
|
Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings [E-Book]
|
|
2017 |
|
.
|
16 |
|
Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings [E-Book]
|
|
2022 |
|
.
|
17 |
|
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [E-Book]
|
|
2017 |
500255484
|
.
|
18 |
|
Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings [E-Book]
|
|
2022 |
|
.
|
19 |
|
Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework [E-Book]
|
Ben Ayed, Ghazi
|
2014 |
|
.
|
20 |
|
Attacking and exploiting modern web applications: discover the mindset, techniques, and tools to perform modern web attacks and exploitation [E-Book]
|
Onofri, Simone
|
2023 |
|
.
|