Showing 1 - 20 results of 33 for search '"Computer security"', query time: 0.08s Refine Results
  1. 1

    Compilation for secure multi-party computation / by Büscher, Niklas

    Published 2017
    Subjects:
    Full Text (via Springer)
    eBook
  2. 2

    Android malware / by Jiang, Xuxian, Zhou, Yajin

    Published 2013
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  3. 3

    Cyber-risk management / by Refsdal, Atle, Solhaug, Bjornar, Stølen, Ketil

    Published 2015
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  4. 4
  5. 5

    Location privacy protection in mobile networks / by Liu, Xinxin, Li, Xiaolin, 1973-

    Published 2013
    Subjects: “…Data encryption (Computer security)…”
    Full Text (via Springer)
    eBook
  6. 6

    Countering brandjacking in the digital age : ... and other hidden risks to your brand / by Hofman, Christopher, Keates, Simeon

    Published 2013
    Subjects: “…Computer security.…”
    Full Text (via Springer)
    eBook
  7. 7

    Security for wireless implantable medical devices / by Hei, Xiali, Du, Xiaojiang

    Published 2013
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  8. 8
  9. 9

    Distributed denial of service attack and defense / by Yu, Shui (Computer scientist)

    Published 2014
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  10. 10

    Automatic malware analysis an emulator based approach / by Yin, Heng

    Published 2013
    Subjects:
    Full Text (via Springer)
    Electronic eBook
  11. 11

    Cryptographic obfuscation : a survey / by Horváth, Máté, Buttyán, Levente

    Published 2020
    Subjects:
    Full Text (via Springer)
    eBook
  12. 12

    Building secure defenses against code-reuse attacks / by Davi, Lucas, Sadeghi, Ahmad-Reza

    Published 2015
    Subjects:
    Full Text (via Springer)
    eBook
  13. 13

    Bootstrapping trust in modern computers by Parno, Bryan

    Published 2011
    Subjects:
    Full Text (via Springer)
    Electronic eBook
  14. 14

    Cyber-security threats and response models in power plants by Smidts, Carol, Ray, Indrajit (Computer scientist), Zhu, Quanyan, Vaddi, Pavan Kumar, Zhao, Yunfei, 1980-, Huang, Linan, Diao, Xiaoxu, Talukdar, Rakibul, Pietrykowski, Michael C.

    Published 2022
    Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
    Full Text (via Springer)
    Electronic eBook
  15. 15

    Smart TV security : media playback and digital video broadcast. / by Michéle, Benjamin

    Published 2015
    Subjects:
    Full Text (via Springer)
    eBook
  16. 16

    Guide to digital forensics : a concise and practical introduction / by Kävrestad, Joakim

    Published 2017
    Subjects:
    Full Text (via ProQuest)
    eBook
  17. 17

    Energy-efficient area coverage for intruder detection in sensor networks / by He, Chibo, Chen, Jiming, 1978-, Li, Junkun, Sun, Youxian

    Published 2014
    Subjects: “…detection systems (Computer security) fast (OCoLC)fst01762593.…”
    Full Text (via Springer)
    eBook
  18. 18

    Guide to differential privacy modifications : a taxonomy of variants and extensions / by Pejó, Balász, Desfontaines, Damien

    Published 2022
    Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
    Full Text (via Springer)
    eBook
  19. 19
  20. 20

    Practical security properties on commodity computing platforms the uber extensible micro-hypervisor framework / by Vasudevan, Amit

    Published 2019
    Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
    Full Text (via Springer)
    Electronic eBook
Search Tools: RSS Feed Save Search