Computing and Information Technology > Computer security

Vis mig kun

Det Intelligente Hjem

Det Intelligente Hjem

Mogens Kahr Nielsen

47,58 DKK

Hvem skal bruge sundhedsdata – og til hvad?
BookClub ready

Hvem skal bruge sundhedsdata – og til hvad?

Klaus Høyer

33,72 DKK

Digital Identity

Digital Identity

Windley, Phillip J.

166,54 DKK

Encryption in a Windows Environment

Encryption in a Windows Environment

Morimoto, Rand

56,07 DKK

Cybersecurity Myths and Misconceptions

Cybersecurity Myths and Misconceptions

Dykstra, Josiah

223,05 DKK

Malicious Cryptography

Malicious Cryptography

Yung, Moti

223,05 DKK

Cybersecurity for eHealth

Cybersecurity for eHealth

Ogu, Emmanuel C.

403,64 DKK

Advancing Computational Intelligence Techniques for Security Systems Design

Advancing Computational Intelligence Techniques for Security Systems Design

Khan, Mohammad Zubair

436,85 DKK

Semantic Control for the Cybersecurity Domain

Semantic Control for the Cybersecurity Domain

Lanza, Claudia

436,85 DKK

Testing and Securing Web Applications

Testing and Securing Web Applications

Johnson, Greg

473,39 DKK

Cyber Strategy

Cyber Strategy

Sweeney, Mark

348,37 DKK

Holistic Approach to Quantum Cryptography in Cyber Security

Holistic Approach to Quantum Cryptography in Cyber Security

Singh, Anuj Kumar

436,85 DKK

Secure Edge Computing

Secure Edge Computing

Haskell-Dowland, Paul

436,85 DKK

Security Awareness Design in the New Normal Age

Security Awareness Design in the New Normal Age

Goucher, Wendy F.

546,47 DKK

Security in IoT

Security in IoT

Roy, Debdutta Barman

436,85 DKK

Wireless Hacking 101

Wireless Hacking 101

Astudillo, Karina

48,96 DKK

Secure Edge Computing

Secure Edge Computing

Haskell-Dowland, Paul

436,85 DKK

Cybersecurity Public Policy

Cybersecurity Public Policy

Maranga, Kennedy

436,85 DKK

Information Security Handbook

Information Security Handbook

Tavares, Joao Manuel R.S.

436,85 DKK

Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols

Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols

Pathan, Al-Sakib Khan

403,64 DKK

Cyber Strategy

Cyber Strategy

Sweeney, Mark

348,37 DKK

Advancing Computational Intelligence Techniques for Security Systems Design

Advancing Computational Intelligence Techniques for Security Systems Design

Khan, Mohammad Zubair

436,85 DKK

Cybersecurity for eHealth

Cybersecurity for eHealth

Ogu, Emmanuel C.

403,64 DKK

Controlling Privacy and the Use of Data Assets - Volume 1

Controlling Privacy and the Use of Data Assets - Volume 1

Mattsson, Ulf

348,37 DKK

Testing and Securing Web Applications

Testing and Securing Web Applications

Johnson, Greg

473,39 DKK

Measuring and Managing Information Risk

Measuring and Managing Information Risk

Jones, Jack

329,95 DKK

Nagios 3 Enterprise Network Monitoring

Nagios 3 Enterprise Network Monitoring

Strand, John

302,96 DKK

Intrusion Prevention and Active Response

Intrusion Prevention and Active Response

Clark, Graham

253,01 DKK

Building Blockchain Apps

Building Blockchain Apps

Yuan, Michael Juntao

223,05 DKK

Host Integrity Monitoring Using Osiris and Samhain

Host Integrity Monitoring Using Osiris and Samhain

Wotring, Brian

223,05 DKK