Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 28
- Security measures 16
- Computer networks 8
- Data encryption (Computer science) 7
- Data protection 6
- Access control 3
- Cloud computing 3
- Computer crimes 3
- Computers 3
- Cyberspace 3
- Prevention 3
- Computer science 2
- Computer software 2
- Denial of service attacks 2
- Image processing 2
- Malware (Computer software) 2
- Mobile communication systems 2
- Wireless communication systems 2
- Artificial intelligence 1
- Bluetooth technology 1
- Branding (Marketing) 1
- Cell phones 1
- Cyberterrorism 1
- Data encryption (Computer security) 1
- Data privacy 1
- Deterrence (Strategy) 1
- Development 1
- Homomorphisms (Mathematics) 1
- Implants, Artificial 1
- Internet 1
-
1
Compilation for secure multi-party computation /
Published 2017Subjects: Full Text (via Springer)
eBook -
2
-
3
-
4
Bluetooth security attacks : comparative analysis, attacks, and countermeasures /
Published 2013Subjects: Full Text (via Skillsoft)
Electronic eBook -
5
Location privacy protection in mobile networks /
Published 2013Subjects: “…Data encryption (Computer security)…”
Full Text (via Springer)
eBook -
6
Countering brandjacking in the digital age : ... and other hidden risks to your brand /
Published 2013Subjects: “…Computer security.…”
Full Text (via Springer)
eBook -
7
Security for wireless implantable medical devices /
Published 2013Subjects: Full Text (via Skillsoft)
Electronic eBook -
8
Artificial intelligence tools for cyber attribution /
Published 2018Subjects: Full Text (via Springer)
eBook -
9
Distributed denial of service attack and defense /
Published 2014Subjects: Full Text (via Skillsoft)
Electronic eBook -
10
Automatic malware analysis an emulator based approach /
Published 2013Subjects: Full Text (via Springer)
Electronic eBook -
11
-
12
Building secure defenses against code-reuse attacks /
Published 2015Subjects: Full Text (via Springer)
eBook -
13
Bootstrapping trust in modern computers
Published 2011Subjects: Full Text (via Springer)
Electronic eBook -
14
Cyber-security threats and response models in power plants
Published 2022Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
Full Text (via Springer)
Electronic eBook -
15
Smart TV security : media playback and digital video broadcast. /
Published 2015Subjects: Full Text (via Springer)
eBook -
16
Guide to digital forensics : a concise and practical introduction /
Published 2017Subjects: Full Text (via ProQuest)
eBook -
17
Energy-efficient area coverage for intruder detection in sensor networks /
Published 2014Subjects: “…detection systems (Computer security) fast (OCoLC)fst01762593.…”
Full Text (via Springer)
eBook -
18
Guide to differential privacy modifications : a taxonomy of variants and extensions /
Published 2022Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
Full Text (via Springer)
eBook -
19
Machine learning for cybersecurity : innovative deep learning solutions /
Published 2022Subjects: Full Text (via Springer)
eBook -
20
Practical security properties on commodity computing platforms the uber extensible micro-hypervisor framework /
Published 2019Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
Full Text (via Springer)
Electronic eBook