Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 10,715
- Security measures 5,517
- Computer networks 3,683
- Data protection 1,525
- Prevention 1,115
- Government policy 979
- Law and legislation 964
- Data encryption (Computer science) 890
- Computer crimes 880
- Information technology 866
- Access control 835
- Computers 743
- Internet 729
- Cyberterrorism 677
- Management 628
- Examinations 520
- Cloud computing 507
- Data processing 437
- Cryptography 429
- Penetration testing (Computer security) 429
- Privacy, Right of 427
- Certification 417
- Electronic data processing personnel 368
- Standards 362
- Administrative agencies 350
- Artificial intelligence 320
- Evaluation 277
- National security 274
- Hackers 273
- Cyber intelligence (Computer security) 267
-
13061
Smart card research and advanced applications VI IFIP 18th World Computer Congress : TC8/WG8.8 & TC11.2 Sixth International Conference on Smart Card Research and Advanced Applicati...
Published 2004Full Text (via Springer)
Electronic Conference Proceeding eBook -
13062
ESEC '91 3rd European Software Engineering Conference, ESEC '91, Milan, Italy, October 21-24, 1991 : proceedings /
Published 1991Full Text (via Springer)
Electronic Conference Proceeding eBook -
13063
Wireless mobile internet security /
Published 2013Table of Contents: “…Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password …”
Full Text (via ProQuest)
eBook -
13064
Wireless mobile internet security /
Published 2013Table of Contents: “…Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password …”
Full Text (via Skillsoft)
Electronic eBook -
13065
Wireless mobile internet security /
Published 2013Table of Contents: “…Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password …”
Full Text (via Wiley)
eBook -
13066
-
13067
-
13068
Lean Six Sigma for the office : integrating customer experience for enhanced productivity /
Published 2021Full Text (via O'Reilly/Safari)
Electronic eBook -
13069
-
13070
Security controls evaluation, testing, and assessment handbook /
Published 2015Full Text (via ProQuest)
eBook -
13071
-
13072
-
13073
Distributed computing in Java 9 : make the best of Java for distributed applications /
Published 2017Table of Contents: “…way SSL -- Cloud computing security -- Security enhancements in Java 9 -- …”
Full Text (via O'Reilly/Safari)
eBook -
13074
Privacy in the information society.
Published 2016Table of Contents: “…Information Management & Computer Security, 9, pp. 165-74. -- 4 'Privacy by Design …”
Full Text (via Taylor & Francis)
Electronic eBook -
13075
Multi-disciplinary trends in artificial intelligence : 16th International Conference, MIWAI 2023, Hyderabad, India, July 21-22, 2023 : proceedings /
Published 2023Table of Contents: “…STORAGE IN CLOUD COMPUTING SECURITY -- An Ensemble Technique to Detect Stress …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
13076
New risks issues and management /
Published 1990Table of Contents: “…Without Measure -- Computer Security Risk Analysis -- Diffuse Risks from Adversarial …”
Full Text (via Springer)
Electronic eBook -
13077
-
13078
-
13079
Security risk management : the driving force for operational resilience : the firefighting paradox /
Published 2024Full Text (via Taylor & Francis)
Electronic eBook -
13080