1 |
|
50 Jahre Universitäts-Informatik in München [E-Book]
|
|
2017 |
|
.
|
2 |
|
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
|
.
|
3 |
|
Advances in Digital Forensics XVIII: 18th IFIP WG 11.9 International Conference, Virtual Event, January 3–4, 2022, Revised Selected Papers [E-Book]
|
|
2022 |
|
.
|
4 |
|
Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings [E-Book]
|
|
2017 |
500256180
|
.
|
5 |
|
Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings [E-Book]
|
|
2017 |
|
.
|
6 |
|
Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings [E-Book]
|
|
2022 |
|
.
|
7 |
|
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [E-Book]
|
|
2017 |
500255484
|
.
|
8 |
|
Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings [E-Book]
|
|
2022 |
|
.
|
9 |
|
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt [E-Book]
|
Steffens, Timo
|
2018 |
|
.
|
10 |
|
Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit [E-Book]
|
Bub, Udo
|
2014 |
|
.
|
11 |
|
Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz [E-Book]
|
Herrmann, Dominik
|
2016 |
|
.
|
12 |
|
Beschaffung unter Berücksichtigung der IT-Sicherheit: Wichtigkeit, Herausforderungen und Maßnahmen [E-Book]
|
Piller, Ernst
|
2017 |
|
.
|
13 |
|
Bring your own Device – Ein Praxisratgeber: HMD Best Paper Award 2014 [E-Book]
|
Walter, Thorsten
|
2015 |
|
.
|
14 |
|
Business Continuity und IT-Notfallmanagement: Grundlagen, Methoden und Konzepte [E-Book]
|
Kersten, Heinrich
|
2017 |
|
.
|
15 |
|
Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet [E-Book]
|
|
2017 |
500248036
|
.
|
16 |
|
Compilation for secure multi-party computation [E-Book]
|
Büscher, Niklas
|
2017 |
|
.
|
17 |
|
Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings [E-Book]
|
|
2017 |
500256195
|
.
|
18 |
|
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500256220
|
.
|
19 |
|
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500256222
|
.
|
20 |
|
Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II [E-Book]
|
|
2022 |
|
.
|