Computing and Information Technology > Computer security

Vis mig kun

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies

Gabriel-Miro

2190,77 DKK

Security and Privacy Issues in Sensor Networks and IoT

Security and Privacy Issues in Sensor Networks and IoT

Mayank

2190,77 DKK

Impact of Digital Transformation on Security Policies and Standards

Impact of Digital Transformation on Security Policies and Standards

Vaishali Ravindra

2190,77 DKK

ISO27001/ISO27002:2013

ISO27001/ISO27002:2013

Calder, Alan

89,65 DKK

E-mail Security

E-mail Security

Dowland, Paul

89,65 DKK

Cybersecurity Maturity Model Certification (CMMC) - A pocket guide

Cybersecurity Maturity Model Certification (CMMC) - A pocket guide

Gamble, William

89,65 DKK

CompTIA Security+ Certification Study Guide

CompTIA Security+ Certification Study Guide

Sheikh, Ahmed F.

473,39 DKK

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Parker, Carey

310,39 DKK

IoT Security Issues

IoT Security Issues

Gilchrist, Alasdair

310,39 DKK

Protective Security

Protective Security

Seaman, Jim

403,64 DKK

Solving Identity Management in Modern Applications

Solving Identity Management in Modern Applications

Hingnikar, Abhishek

403,64 DKK

Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)

Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)

Natalie

2190,77 DKK

Choose Your InfoSec Path

Choose Your InfoSec Path

Roxon, Alexander J.

473,39 DKK

Theoretical Cybersecurity

Theoretical Cybersecurity

Sewell, J. Louis

403,64 DKK

Two-Factor Authentication

Two-Factor Authentication

Stanislav, Mark

117,05 DKK

Introduction to Hacking and Crimeware

Introduction to Hacking and Crimeware

Loewengart, Victoria

89,65 DKK

Security

Security

Kearney, Paul

89,65 DKK

True Cost of Information Security Breaches and Cyber Crime

True Cost of Information Security Breaches and Cyber Crime

Walker, Prof. John

89,65 DKK

Security Consultant's Handbook

Security Consultant's Handbook

Bingley, Richard

348,37 DKK

Quantum Cryptography and the Future of Cyber Security

Quantum Cryptography and the Future of Cyber Security

Bhavesh B.

2190,77 DKK

Handbook of Research on Intrusion Detection Systems

Handbook of Research on Intrusion Detection Systems

Srivathsan

2921,57 DKK

Data Science For Cyber-security

Data Science For Cyber-security

Mellisa Turcotte, Turcotte

802,25 DKK

Cyber Security: Essential principles to secure your organisation

Cyber Security: Essential principles to secure your organisation

Calder, Alan

89,65 DKK

Critical Concepts, Standards, and Techniques in Cyber Forensics

Critical Concepts, Standards, and Techniques in Cyber Forensics

Mohammad Zunnun

2190,77 DKK

Web Penetration Testing

Web Penetration Testing

Shatob, Radhi

78,54 DKK

Data Science For Cyber-security

Data Science For Cyber-security

Mellisa Turcotte, Turcotte

802,25 DKK

Intrusion Detection: A Machine Learning Approach

Intrusion Detection: A Machine Learning Approach

Zhenwei Yu, Yu

317,82 DKK

Engineering Psychology and Cognitive Ergonomics. Cognition and Design

Engineering Psychology and Cognitive Ergonomics. Cognition and Design

Li, Wen-Chin

436,85 DKK

Progress in Artificial Intelligence and Pattern Recognition

Progress in Artificial Intelligence and Pattern Recognition

Shulcloper, Jose Ruiz

436,85 DKK

Intelligent Data Processing

Intelligent Data Processing

Vorontsov, Konstantin V.

436,85 DKK