#network-security

icon subthematics
Handbook of Cloud Computing
Category

Ebooks

Handbook of Cloud Computing

Nayyar Dr. Anand

Handbook of Cloud Computing Alternate Text
Category

Ebooks

Informatique

Handbook of Cloud Computing

Nayyar Dr. Anand

Book

265 pages

Flag

English

Understand, Manage, and Prevent Algorithmic Bias
Category

Ebooks

Understand, Manage, and Prevent Algorithmic Bias

Tobias Baer

Understand, Manage, and Prevent Algorithmic Bias Alternate Text
Category

Ebooks

Informatique

Understand, Manage, and Prevent Algorithmic Bias

Tobias Baer

Book

180 pages

Flag

English

Practical Guide to Coping with Cyberstalking
Category

Ebooks

Practical Guide to Coping with Cyberstalking

Cyberstalking Research National Centre for

Practical Guide to Coping with Cyberstalking Alternate Text
Category

Ebooks

Informatique

Practical Guide to Coping with Cyberstalking

Cyberstalking Research National Centre for

Book

172 pages

Flag

English

Information Technology for Peace and Security
Category

Ebooks

Information Technology for Peace and Security

Information Technology for Peace and Security Alternate Text
Category

Ebooks

Informatique

Information Technology for Peace and Security

Book

425 pages

Flag

English

Cyber Security. Simply. Make it Happen.
Category

Ebooks

Cyber Security. Simply. Make it Happen.

Cyber Security. Simply. Make it Happen. Alternate Text
Category

Ebooks

Informatique

Cyber Security. Simply. Make it Happen.

Book

136 pages

Flag

English

IT-Sicherheit mit System
Category

Ebooks

IT-Sicherheit mit System

Klaus-Rainer Müller

IT-Sicherheit mit System Alternate Text
Category

Ebooks

Informatique

IT-Sicherheit mit System

Klaus-Rainer Müller

Book

898 pages

Flag

German, Middle High (ca.1050-1500)

Handbuch Unternehmenssicherheit
Category

Ebooks

Handbuch Unternehmenssicherheit

Klaus-Rainer Müller

Handbuch Unternehmenssicherheit Alternate Text
Category

Ebooks

Informatique

Handbuch Unternehmenssicherheit

Klaus-Rainer Müller

Book

654 pages

Flag

German, Middle High (ca.1050-1500)

Open Source Intelligence and Cyber Crime
Category

Ebooks

Open Source Intelligence and Cyber Crime

Open Source Intelligence and Cyber Crime Alternate Text
Category

Ebooks

Informatique

Open Source Intelligence and Cyber Crime

Book

192 pages

Flag

English

New Dimensions of Information Warfare
Category

Ebooks

New Dimensions of Information Warfare

Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci

New Dimensions of Information Warfare Alternate Text
Category

Ebooks

Informatique

New Dimensions of Information Warfare

Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci

Book

188 pages

Flag

English

Attribution of Advanced Persistent Threats
Category

Ebooks

Attribution of Advanced Persistent Threats

Timo Steffens

Attribution of Advanced Persistent Threats Alternate Text
Category

Ebooks

Informatique

Attribution of Advanced Persistent Threats

Timo Steffens

Book

159 pages

Flag

English

Hybride Testumgebungen für Kritische Infrastrukturen
Category

Ebooks

Hybride Testumgebungen für Kritische Infrastrukturen

Olof Leps

Hybride Testumgebungen für Kritische Infrastrukturen Alternate Text
Category

Ebooks

Informatique

Hybride Testumgebungen für Kritische Infrastrukturen

Olof Leps

Book

154 pages

Flag

German, Middle High (ca.1050-1500)

Practical Guide to Coping with Cyberstalking
Category

Ebooks

Practical Guide to Coping with Cyberstalking

Cyberstalking Research National Centre for

Practical Guide to Coping with Cyberstalking Alternate Text
Category

Ebooks

Informatique

Practical Guide to Coping with Cyberstalking

Cyberstalking Research National Centre for

Book

94 pages

Flag

English

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data
Category

Ebooks

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data Alternate Text
Category

Ebooks

Informatique

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data

Book

239 pages

Flag

English

Nuclear Non-proliferation and Arms Control Verification
Category

Ebooks

Nuclear Non-proliferation and Arms Control Verification

Nuclear Non-proliferation and Arms Control Verification Alternate Text
Category

Ebooks

Droit et juridique

Nuclear Non-proliferation and Arms Control Verification

Book

330 pages

Flag

English

  • 1
Alternate Text