Computing and Information Technology > Computer security

Vis mig kun

Future Data and Security Engineering

Future Data and Security Engineering

Bui, Son Ha

436,85 DKK

Graphical Models for Security

Graphical Models for Security

Probst, Christian W.

436,85 DKK

Future Data and Security Engineering

Future Data and Security Engineering

Bui, Son Ha

436,85 DKK

Graphical Models for Security

Graphical Models for Security

Probst, Christian W.

436,85 DKK

Practice of Enterprise Modeling

Practice of Enterprise Modeling

Proper, Henderik A.

436,85 DKK

Practical Security Properties on Commodity Computing Platforms

Practical Security Properties on Commodity Computing Platforms

Vasudevan, Amit

436,85 DKK

Cloud Computing and Security

Cloud Computing and Security

Bertino, Elisa

436,85 DKK

Practical Security Properties on Commodity Computing Platforms

Practical Security Properties on Commodity Computing Platforms

Vasudevan, Amit

436,85 DKK

Cloud Computing and Security

Cloud Computing and Security

Bertino, Elisa

436,85 DKK

Practice of Enterprise Modeling

Practice of Enterprise Modeling

Proper, Henderik A.

436,85 DKK

Simulation and Synthesis in Medical Imaging

Simulation and Synthesis in Medical Imaging

Burgos, Ninon

436,85 DKK

5G for Future Wireless Networks

5G for Future Wireless Networks

Zhang, Zhongshan

875,33 DKK

Simulation and Synthesis in Medical Imaging

Simulation and Synthesis in Medical Imaging

Burgos, Ninon

436,85 DKK

Malware Analysis Using Artificial Intelligence and Deep Learning

Malware Analysis Using Artificial Intelligence and Deep Learning

Shalaginov, Andrii

1386,89 DKK

Information Security

Information Security

Intan, Rolly

436,85 DKK

Privacy Risk Analysis

Privacy Risk Analysis

Metayer, Daniel Le

329,95 DKK

Security and Trust in Online Social Networks

Security and Trust in Online Social Networks

Viviani, Marco

265,81 DKK

5G for Future Wireless Networks

5G for Future Wireless Networks

Zhang, Zhongshan

875,33 DKK

Hardware Malware

Hardware Malware

Hobel, Heidelinde

265,81 DKK

Malware Analysis Using Artificial Intelligence and Deep Learning

Malware Analysis Using Artificial Intelligence and Deep Learning

Shalaginov, Andrii

1386,89 DKK

Stream Ciphers in Modern Real-time IT Systems

Stream Ciphers in Modern Real-time IT Systems

Kryvinska, Natalia

1313,81 DKK

Information Security and Cryptology

Information Security and Cryptology

Yung, Moti

436,85 DKK

Information Security

Information Security

Intan, Rolly

619,55 DKK

Artificial Intelligence Tools for Cyber Attribution

Artificial Intelligence Tools for Cyber Attribution

Ruef, Andrew

436,85 DKK

Reversible Digital Watermarking

Reversible Digital Watermarking

Chakraborty, Rajat Subhra

265,81 DKK

Information Security

Information Security

Intan, Rolly

619,55 DKK

Information Security and Cryptology

Information Security and Cryptology

Yung, Moti

436,85 DKK

CISO's Transformation

CISO's Transformation

Badhwar, Raj

509,93 DKK

Foundations and Practice of Security

Foundations and Practice of Security

Garcia-Alfaro, Joaquin

436,85 DKK

CISO's Transformation

CISO's Transformation

Badhwar, Raj

509,93 DKK