#computer-security

icon subthematics
My Data My Privacy My Choice
Category

Ebooks

My Data My Privacy My Choice

Srivastwa Rohit

My Data My Privacy My Choice Alternate Text
Category

Ebooks

Informatique

My Data My Privacy My Choice

Srivastwa Rohit

Book

220 pages

Flag

English

The Inventions of Louis Pouzin
Category

Ebooks

The Inventions of Louis Pouzin

Chantal Lebrument, Fabien Soyez

The Inventions of Louis Pouzin Alternate Text
Category

Ebooks

Informatique

The Inventions of Louis Pouzin

Chantal Lebrument, Fabien Soyez

Book

173 pages

Flag

English

Conquer the Web
Category

Ebooks

Conquer the Web

Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou

Conquer the Web Alternate Text
Category

Ebooks

Informatique

Conquer the Web

Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou

Book

103 pages

Flag

English

Understand, Manage, and Prevent Algorithmic Bias
Category

Ebooks

Understand, Manage, and Prevent Algorithmic Bias

Tobias Baer

Understand, Manage, and Prevent Algorithmic Bias Alternate Text
Category

Ebooks

Informatique

Understand, Manage, and Prevent Algorithmic Bias

Tobias Baer

Book

180 pages

Flag

English

Managing Cybersecurity Risk
Category

Ebooks

Managing Cybersecurity Risk

Jonathan Reuvid

Managing Cybersecurity Risk Alternate Text
Category

Ebooks

Informatique

Managing Cybersecurity Risk

Jonathan Reuvid

Book

107 pages

Flag

English

Cyber Security. Simply. Make it Happen.
Category

Ebooks

Cyber Security. Simply. Make it Happen.

Cyber Security. Simply. Make it Happen. Alternate Text
Category

Ebooks

Informatique

Cyber Security. Simply. Make it Happen.

Book

136 pages

Flag

English

Information Technology for Peace and Security
Category

Ebooks

Information Technology for Peace and Security

Information Technology for Peace and Security Alternate Text
Category

Ebooks

Informatique

Information Technology for Peace and Security

Book

425 pages

Flag

English

Open Source Intelligence and Cyber Crime
Category

Ebooks

Open Source Intelligence and Cyber Crime

Open Source Intelligence and Cyber Crime Alternate Text
Category

Ebooks

Informatique

Open Source Intelligence and Cyber Crime

Book

192 pages

Flag

English

New Dimensions of Information Warfare
Category

Ebooks

New Dimensions of Information Warfare

Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci

New Dimensions of Information Warfare Alternate Text
Category

Ebooks

Informatique

New Dimensions of Information Warfare

Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci

Book

188 pages

Flag

English

Ripple and Stablecoins
Category

Ebooks

Ripple and Stablecoins

Debajani Mohanty

Ripple and Stablecoins Alternate Text
Category

Ebooks

Informatique

Ripple and Stablecoins

Debajani Mohanty

Book

103 pages

Flag

English

Be Cyber Secure: Tales, Tools and Threats
Category

Ebooks

Be Cyber Secure: Tales, Tools and Threats

Jonathan Reuvid

Be Cyber Secure: Tales, Tools and Threats Alternate Text
Category

Ebooks

Informatique

Be Cyber Secure: Tales, Tools and Threats

Jonathan Reuvid

Book

171 pages

Flag

English

Handbuch Unternehmenssicherheit
Category

Ebooks

Handbuch Unternehmenssicherheit

Klaus-Rainer Müller

Handbuch Unternehmenssicherheit Alternate Text
Category

Ebooks

Informatique

Handbuch Unternehmenssicherheit

Klaus-Rainer Müller

Book

654 pages

Flag

German, Middle High (ca.1050-1500)

IT-Sicherheit mit System
Category

Ebooks

IT-Sicherheit mit System

Klaus-Rainer Müller

IT-Sicherheit mit System Alternate Text
Category

Ebooks

Informatique

IT-Sicherheit mit System

Klaus-Rainer Müller

Book

898 pages

Flag

German, Middle High (ca.1050-1500)

Easy Steps to Managing Cybersecurity
Category

Ebooks

Easy Steps to Managing Cybersecurity

Easy Steps to Managing Cybersecurity Alternate Text
Category

Ebooks

Informatique

Easy Steps to Managing Cybersecurity

Book

135 pages

Flag

English

Managing Cybersecurity Risk
Category

Ebooks

Managing Cybersecurity Risk

Jonathan Reuvid

Managing Cybersecurity Risk Alternate Text
Category

Ebooks

Informatique

Managing Cybersecurity Risk

Jonathan Reuvid

Book

150 pages

Flag

English

Managing Cybersecurity Risk
Category

Ebooks

Managing Cybersecurity Risk

Jonathan Reuvid

Managing Cybersecurity Risk Alternate Text
Category

Ebooks

Informatique

Managing Cybersecurity Risk

Jonathan Reuvid

Book

112 pages

Flag

English

Attribution of Advanced Persistent Threats
Category

Ebooks

Attribution of Advanced Persistent Threats

Timo Steffens

Attribution of Advanced Persistent Threats Alternate Text
Category

Ebooks

Informatique

Attribution of Advanced Persistent Threats

Timo Steffens

Book

159 pages

Flag

English

Computer Security (Speedy Study Guides)
Category

Ebooks

Computer Security (Speedy Study Guides)

Speedy Publishing

Computer Security (Speedy Study Guides) Alternate Text
Category

Ebooks

Informatique

Computer Security (Speedy Study Guides)

Speedy Publishing

Book

6 pages

Flag

English

Hybride Testumgebungen für Kritische Infrastrukturen
Category

Ebooks

Hybride Testumgebungen für Kritische Infrastrukturen

Olof Leps

Hybride Testumgebungen für Kritische Infrastrukturen Alternate Text
Category

Ebooks

Informatique

Hybride Testumgebungen für Kritische Infrastrukturen

Olof Leps

Book

154 pages

Flag

German, Middle High (ca.1050-1500)

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data
Category

Ebooks

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data Alternate Text
Category

Ebooks

Informatique

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data

Book

239 pages

Flag

English

Advances in Cyber Security
Category

Ebooks

Advances in Cyber Security

Dorothy Marinucci, Frank Hsu D.

Advances in Cyber Security Alternate Text
Category

Ebooks

Sciences humaines et sociales

Advances in Cyber Security

Dorothy Marinucci, Frank Hsu D.

Book

272 pages

Flag

English

Advances in Cyber Security
Category

Ebooks

Advances in Cyber Security

Dorothy Marinucci, Frank Hsu D.

Advances in Cyber Security Alternate Text
Category

Ebooks

Sciences humaines et sociales

Advances in Cyber Security

Dorothy Marinucci, Frank Hsu D.

Book

154 pages

Flag

English

Cyber & You
Category

Ebooks

Cyber & You

Maureen Kendal

Cyber & You Alternate Text
Category

Ebooks

Informatique

Cyber & You

Maureen Kendal

Book

107 pages

Flag

English

Nuclear Non-proliferation and Arms Control Verification
Category

Ebooks

Nuclear Non-proliferation and Arms Control Verification

Nuclear Non-proliferation and Arms Control Verification Alternate Text
Category

Ebooks

Droit et juridique

Nuclear Non-proliferation and Arms Control Verification

Book

330 pages

Flag

English

Major Area Exam Reading List
Category

Documents

Major Area Exam Reading List

Vidula

Major Area Exam Reading List Alternate Text
Category

Documents

Révisions

Major Area Exam Reading List

Vidula

Book

22 pages

Flag

English

INRIA Rennes Bretagne Atlantique jeremy fr
Category

Documents

INRIA Rennes Bretagne Atlantique jeremy fr

Jérémy Dubreil

INRIA Rennes Bretagne Atlantique jeremy fr Alternate Text
Category

Documents

Etudes supérieures

INRIA Rennes Bretagne Atlantique jeremy fr

Jérémy Dubreil

Book

15 pages

Flag

English

Implementación de una red Neuronal para la detección de intrusiones en una red TCP/IP. (Implementation of a Neural Network for intrusion detection in a TCP/IP network).
Category

Documents

Implementación de una red Neuronal para la detección de intrusiones en una red TCP/IP. (Implementation of a Neural Network for intrusion detection in a TCP/IP network).

David

Implementación de una red Neuronal para la detección de intrusiones en una red TCP/IP. (Implementation of a Neural Network for intrusion detection in a TCP/IP network). Alternate Text
Category

Documents

Autres

Implementación de una red Neuronal para la detección de intrusiones en una red TCP/IP. (Implementation of a Neural Network for intrusion detection in a TCP/IP network).

David

Book

4 pages

Flag

Español

NTM White Paper 4Jun10
Category

Documents

NTM White Paper 4Jun10

Robin Aylor

NTM White Paper 4Jun10 Alternate Text
Category

Documents

Travaux de classe

NTM White Paper 4Jun10

Robin Aylor

Book

6 pages

Flag

Deutsch

  • 1
Alternate Text