UBL

Vis mig kun

Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Dahiya, Amrita

177,19 DKK

Beginner's Guide to Internet of Things Security

Beginner's Guide to Internet of Things Security

Tewari, Aakanksha

177,19 DKK

Botnets

Botnets

Zhou, Peng

403,64 DKK

Enhancing Business Continuity and IT Capability

Enhancing Business Continuity and IT Capability

Alagic, Amra

403,64 DKK

Trust, Security and Privacy for Big Data

Trust, Security and Privacy for Big Data

Gupta, Maanak

436,85 DKK

Security of Internet of Things Nodes

Security of Internet of Things Nodes

Rehman, Muhammad Habibur

436,85 DKK

Botnets

Botnets

Zhou, Peng

403,64 DKK

Cyber Security Applications for Industry 4.0

Cyber Security Applications for Industry 4.0

Jhanjhi, Noor Zaman

436,85 DKK

Trust, Security and Privacy for Big Data

Trust, Security and Privacy for Big Data

Gupta, Maanak

436,85 DKK

Cybersecurity Body of Knowledge

Cybersecurity Body of Knowledge

Sigler, Ken

348,37 DKK

Enhancing Business Continuity and IT Capability

Enhancing Business Continuity and IT Capability

Alagic, Amra

403,64 DKK

Cybersecurity Body of Knowledge

Cybersecurity Body of Knowledge

Sigler, Ken

348,37 DKK

Cyber Security Applications for Industry 4.0

Cyber Security Applications for Industry 4.0

Jhanjhi, Noor Zaman

436,85 DKK

Beginner's Guide to Internet of Things Security

Beginner's Guide to Internet of Things Security

Tewari, Aakanksha

177,19 DKK

Building in Security at Agile Speed

Building in Security at Agile Speed

Schoenfield, Brook S.E.

546,47 DKK

Cloud Computing Security

Cloud Computing Security

Vacca, John R.

583,01 DKK

Cloud Computing Security

Cloud Computing Security

Vacca, John R.

583,01 DKK

Digital Image Watermarking

Digital Image Watermarking

Dey, Nilanjan

177,19 DKK

Digital Image Watermarking

Digital Image Watermarking

Dey, Nilanjan

177,19 DKK

Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Dahiya, Amrita

177,19 DKK

Building in Security at Agile Speed

Building in Security at Agile Speed

Schoenfield, Brook S.E.

546,47 DKK

Uncertain Digital Revolution

Uncertain Digital Revolution

Vitalis, Andr

1313,81 DKK

Open Source Systems: Enterprise Software and Solutions

Open Source Systems: Enterprise Software and Solutions

Anagnostopoulos, Dimosthenis

436,85 DKK

Cyber Attack Information System

Cyber Attack Information System

Skopik, Florian

223,05 DKK

Attribution of Advanced Persistent Threats

Attribution of Advanced Persistent Threats

Steffens, Timo

509,93 DKK

Attribution of Advanced Persistent Threats

Attribution of Advanced Persistent Threats

Steffens, Timo

509,93 DKK

Computational Forensics

Computational Forensics

Veenman, Cor J.

436,85 DKK

Controlling Privacy and the Use of Data Assets - Volume 2

Controlling Privacy and the Use of Data Assets - Volume 2

Mattsson, Ulf

348,37 DKK

Uncertain Digital Revolution

Uncertain Digital Revolution

Vitalis, Andr

1313,81 DKK

Empirical Research for Software Security

Empirical Research for Software Security

Weippl, Edgar

403,64 DKK