UBL

Vis mig kun

Distributed Denial of Service Attacks

Distributed Denial of Service Attacks

Brooks, Richard

583,01 DKK

Distributed Denial of Service Attacks

Distributed Denial of Service Attacks

Brooks, Richard

583,01 DKK

Software Similarity and Classification

Software Similarity and Classification

Xiang, Yang

436,85 DKK

Network and Application Security

Network and Application Security

Ganguly, Debashis

802,25 DKK

Software Test Attacks to Break Mobile and Embedded Devices

Software Test Attacks to Break Mobile and Embedded Devices

Hagar, Jon Duncan

546,47 DKK

Multilevel Security for Relational Databases

Multilevel Security for Relational Databases

El-Sayed, Hala S.

509,93 DKK

Empirical Research for Software Security

Empirical Research for Software Security

Weippl, Edgar

403,64 DKK

Secrets of a Cyber Security Architect

Secrets of a Cyber Security Architect

Schoenfield, Brook S. E.

546,47 DKK

Software Test Attacks to Break Mobile and Embedded Devices

Software Test Attacks to Break Mobile and Embedded Devices

Hagar, Jon Duncan

546,47 DKK

Accelerating Cloud Adoption

Accelerating Cloud Adoption

Kavis, Michael

310,39 DKK

Accelerating Cloud Adoption

Accelerating Cloud Adoption

Kavis, Michael

310,39 DKK

Big Data Analytics with Applications in Insider Threat Detection

Big Data Analytics with Applications in Insider Threat Detection

Khan, Latifur

403,64 DKK

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

Giovanni

2190,77 DKK

Data Protection Officer

Data Protection Officer

Edvardsen, Sofia

173,39 DKK

Data Protection Officer

Data Protection Officer

Edvardsen, Sofia

173,39 DKK

Artificial Intelligence and Security

Artificial Intelligence and Security

Bertino, Elisa

436,85 DKK

Hybrid Artificial Intelligent Systems

Hybrid Artificial Intelligent Systems

Rodriguez, Emilio Corchado

436,85 DKK

Smart Computing and Communication

Smart Computing and Communication

Qiu, Meikang

436,85 DKK

Hybrid Artificial Intelligent Systems

Hybrid Artificial Intelligent Systems

Rodriguez, Emilio Corchado

436,85 DKK

Critical Information Infrastructures Security

Critical Information Infrastructures Security

Hammerli, Bernhard M.

436,85 DKK

Decision and Game Theory for Security

Decision and Game Theory for Security

Dan, Gyorgy

436,85 DKK

Graphical Models for Security

Graphical Models for Security

Fila, Barbara

436,85 DKK

Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Toma, Cristian

656,09 DKK

Smart Computing and Communication

Smart Computing and Communication

Qiu, Meikang

436,85 DKK

Graphical Models for Security

Graphical Models for Security

Fila, Barbara

436,85 DKK

Critical Infrastructure Protection XIII

Critical Infrastructure Protection XIII

Shenoi, Sujeet

436,85 DKK

Decision and Game Theory for Security

Decision and Game Theory for Security

Dan, Gyorgy

436,85 DKK

Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Toma, Cristian

656,09 DKK

Engineering Applications of Neural Networks

Engineering Applications of Neural Networks

Likas, Aristidis

875,33 DKK

Information Security

Information Security

Eloff, Jan

436,85 DKK