1 |
![50 Jahre Universitäts-Informatik in München 50 Jahre Universitäts-Informatik in München](Cover.cls?type=cover&isbn=9783662547120&size=100) |
50 Jahre Universitäts-Informatik in München [E-Book]
|
|
2017 |
|
.
|
2 |
![Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319672083&size=100) |
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
|
.
|
3 |
![Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings](Cover.cls?type=cover&isbn=9783319642000&size=100) |
Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings [E-Book]
|
|
2017 |
500256180
|
.
|
4 |
![Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings](Cover.cls?type=cover&isbn=9789811054211&size=100) |
Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings [E-Book]
|
|
2017 |
|
.
|
5 |
![Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings](Cover.cls?type=cover&isbn=9783319612041&size=100) |
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [E-Book]
|
|
2017 |
500255484
|
.
|
6 |
![Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt](Cover.cls?type=cover&isbn=9783662559543&size=100) |
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt [E-Book]
|
Steffens, Timo
|
2018 |
|
.
|
7 |
![Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit](Cover.cls?type=cover&isbn=9783658064136&size=100) |
Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit [E-Book]
|
Bub, Udo
|
2014 |
|
.
|
8 |
![Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz](Cover.cls?type=cover&isbn=9783658132637&size=100) |
Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz [E-Book]
|
Herrmann, Dominik
|
2016 |
|
.
|
9 |
![Beschaffung unter Berücksichtigung der IT-Sicherheit: Wichtigkeit, Herausforderungen und Maßnahmen Beschaffung unter Berücksichtigung der IT-Sicherheit: Wichtigkeit, Herausforderungen und Maßnahmen](Cover.cls?type=cover&isbn=9783658185992&size=100) |
Beschaffung unter Berücksichtigung der IT-Sicherheit: Wichtigkeit, Herausforderungen und Maßnahmen [E-Book]
|
Piller, Ernst
|
2017 |
|
.
|
10 |
![Bring your own Device – Ein Praxisratgeber: HMD Best Paper Award 2014 Bring your own Device – Ein Praxisratgeber: HMD Best Paper Award 2014](Cover.cls?type=cover&isbn=9783658115913&size=100) |
Bring your own Device – Ein Praxisratgeber: HMD Best Paper Award 2014 [E-Book]
|
Walter, Thorsten
|
2015 |
|
.
|
11 |
![Business Continuity und IT-Notfallmanagement: Grundlagen, Methoden und Konzepte Business Continuity und IT-Notfallmanagement: Grundlagen, Methoden und Konzepte](Cover.cls?type=cover&isbn=9783658191184&size=100) |
Business Continuity und IT-Notfallmanagement: Grundlagen, Methoden und Konzepte [E-Book]
|
Kersten, Heinrich
|
2017 |
|
.
|
12 |
![Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet](Cover.cls?type=cover&isbn=9783319555898&size=100) |
Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet [E-Book]
|
|
2017 |
500248036
|
.
|
13 |
![Compilation for secure multi-party computation Compilation for secure multi-party computation](Cover.cls?type=cover&isbn=9783319675220&size=100) |
Compilation for secure multi-party computation [E-Book]
|
Büscher, Niklas
|
2017 |
|
.
|
14 |
![Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen](Cover.cls?type=cover&isbn=9783662670309&size=100) |
Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen [E-Book]
|
Kebschull, Udo
|
2023 |
|
.
|
15 |
![Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings](Cover.cls?type=cover&isbn=9783319651279&size=100) |
Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings [E-Book]
|
|
2017 |
500256195
|
.
|
16 |
![Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I](Cover.cls?type=cover&isbn=9783319664026&size=100) |
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500256220
|
.
|
17 |
![Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II](Cover.cls?type=cover&isbn=9783319663999&size=100) |
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500256222
|
.
|
18 |
![Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319646473&size=100) |
Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
500256189
|
.
|
19 |
![Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319713687&size=100) |
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers [E-Book]
|
|
2017 |
500268079
|
.
|
20 |
![Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319703954&size=100) |
Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
|
.
|