Computing and Information Technology > Computer security

Vis mig kun

Solving Identity Management in Modern Applications

Solving Identity Management in Modern Applications

Hingnikar, Abhishek

473,39 DKK

Building Secure Firmware

Building Secure Firmware

Zimmer, Vincent

403,64 DKK

Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Hijazi, Rami

403,64 DKK

Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

Valites, Matthew

273,24 DKK

IoT Security Issues

IoT Security Issues

Gilchrist, Alasdair

310,39 DKK

Zero Trust Security

Zero Trust Security

Chapman, Jerry W.

403,64 DKK

Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows

Hijazi, Rami

509,93 DKK

Digital Forensics Basics

Digital Forensics Basics

Hassan, Nihad A.

403,64 DKK

Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

Valites, Matthew

273,24 DKK

Winning the National Security AI Competition

Winning the National Security AI Competition

Strickland, Frank

436,85 DKK

Cyber Self-Defense

Cyber Self-Defense

Edwards, Laurie

107,91 DKK

Snowflake Security

Snowflake Security

Cohen, Yoav

403,64 DKK

Cyber Operations

Cyber Operations

O'Leary, Mike

619,55 DKK

Cyber Threat Intelligence

Cyber Threat Intelligence

Roberts, Aaron

403,64 DKK

Threat Modeling

Threat Modeling

Coles, Matthew J.

359,43 DKK

Ransomware Revealed

Ransomware Revealed

Hassan, Nihad A.

288,10 DKK

Architecture of Privacy

Architecture of Privacy

Lerner, Elissa

166,54 DKK

Essential Cybersecurity Science

Essential Cybersecurity Science

Dykstra, Josiah

273,24 DKK

Snowflake Security

Snowflake Security

Cohen, Yoav

403,64 DKK

Handbook of Research on Machine and Deep Learning Applications for Cyber Security

Handbook of Research on Machine and Deep Learning Applications for Cyber Security

D.

2921,57 DKK

Handbook of Research on Network Forensics and Analysis Techniques

Handbook of Research on Network Forensics and Analysis Techniques

Nilanjan

3652,37 DKK

Location Privacy in Wireless Sensor Networks

Location Privacy in Wireless Sensor Networks

Cuellar, Jorge

403,64 DKK

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

B. Thirumala

2190,77 DKK

Phishing and Communication Channels

Phishing and Communication Channels

Sonowal, Gunikhan

403,64 DKK

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism

Arif

2190,77 DKK

Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing

Kashif

1386,89 DKK

Exploring Security in Software Architecture and Design

Exploring Security in Software Architecture and Design

Riccardo

2190,77 DKK

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Kumar, Dinesh

265,81 DKK