Computing and Information Technology > Computer security

Vis mig kun

Securecsocial: Secure Cloud-based Social Network

Securecsocial: Secure Cloud-based Social Network

Kasun Senevirathna, Senevirathna

436,85 DKK

Mathematics and Computing

Mathematics and Computing

Obaidat, Mohammad S.

436,85 DKK

Mathematics and Computing

Mathematics and Computing

Obaidat, Mohammad S.

436,85 DKK

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Malar, B.

436,85 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2190,77 DKK

Privacy-Preserving Deep Learning

Privacy-Preserving Deep Learning

Tanuwidjaja, Harry Chandra

509,93 DKK

Mathematics and Computing

Mathematics and Computing

Singh, L. P.

436,85 DKK

Emerging Trends in Expert Applications and Security

Emerging Trends in Expert Applications and Security

Maheshwari, Shikha

1240,73 DKK

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Ramanathan, Periakaruppan

436,85 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2190,77 DKK

Mathematics and Computing

Mathematics and Computing

Singh, L. P.

436,85 DKK

Emerging Trends in Expert Applications and Security

Emerging Trends in Expert Applications and Security

Maheshwari, Shikha

1240,73 DKK

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Ramanathan, Periakaruppan

436,85 DKK

Privacy-Preserving Deep Learning

Privacy-Preserving Deep Learning

Tanuwidjaja, Harry Chandra

509,93 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2921,57 DKK

Data Driven Approach Towards Disruptive Technologies

Data Driven Approach Towards Disruptive Technologies

Mahdi, Hussain Falih

2921,57 DKK

Internet of Things Security: Principles and Practice

Internet of Things Security: Principles and Practice

Du, Fan

619,55 DKK

Handbook Of Electronic Security And Digital Forensics

Handbook Of Electronic Security And Digital Forensics

Frank Leonhardt, Leonhardt

729,17 DKK

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability

Aoying Zhou, Zhou

619,55 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2921,57 DKK

Closer Look at Online Deception and Disinformation

Closer Look at Online Deception and Disinformation

Suzanne M. Williams

1386,89 DKK

Embedded Systems and Artificial Intelligence

Embedded Systems and Artificial Intelligence

Satori, Hassan

2190,77 DKK

Reversible Steganography and Authentication via Transform Encoding

Reversible Steganography and Authentication via Transform Encoding

Mandal, Jyotsna Kumar

1313,81 DKK

Internet of Things Security: Principles and Practice

Internet of Things Security: Principles and Practice

Du, Fan

619,55 DKK

Trust And Security In Collaborative Computing

Trust And Security In Collaborative Computing

Yi Pan, Pan

403,64 DKK

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability

Aoying Zhou, Zhou

619,55 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2921,57 DKK

Kish Cypher, The: The Story Of Kljn For Unconditional Security

Kish Cypher, The: The Story Of Kljn For Unconditional Security

Laszlo B Kish, Kish

875,33 DKK

Embedded Systems and Artificial Intelligence

Embedded Systems and Artificial Intelligence

Satori, Hassan

2190,77 DKK

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security

Dutta, Soumi

2921,57 DKK