Netzwerksicherheit
Checklisten Handbuch IT-Grundschutz
Checklisten Handbuch IT-Grundschutz
Prüfaspekte des IT-Grundschutz-Kompendiums (Stand 6. Edition)
8., aktualisierte Auflage
Huang / Parisi / Tan / Ma / Zhang
Web3 Applications Security and New Security Landscape
Web3 Applications Security and New Security Landscape
Theories and Practices
Sawik
Stochastic Programming in Supply Chain Risk Management
Stochastic Programming in Supply Chain Risk Management
Resilience, Viability, and Cybersecurity
Shafie-khah / Gazafroudi
Trading in Local Energy Markets and Energy Communities
Trading in Local Energy Markets and Energy Communities
Concepts, Structures and Technologies
Reiss
Konzepte für Compliance, Agilität und Digitalisierung
Kebschull
Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
Bieker / de Conca / Gruschka / Jensen / Schiering
Privacy and Identity Management. Sharing in a Digital World
Privacy and Identity Management. Sharing in a Digital World
18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers
Almeida / Di Ciccio / Kalloniatis
Advanced Information Systems Engineering Workshops
Advanced Information Systems Engineering Workshops
CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings
Rannenberg / Drogkaris / Lauradoux
Privacy Technologies and Policy
Privacy Technologies and Policy
11th Annual Privacy Forum, APF 2023, Lyon, France, June 1–2, 2023, Proceedings
Sarker
AI-Driven Cybersecurity and Threat Intelligence
AI-Driven Cybersecurity and Threat Intelligence
Cyber Automation, Intelligent Decision-Making and Explainability
Chen / Xia
Blockchain Technology and Emerging Applications
Blockchain Technology and Emerging Applications
Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings
Parkinson / Nikitas / Vallati
Deception in Autonomous Transport Systems
Deception in Autonomous Transport Systems
Threats, Impacts and Mitigation Policies
Andreoni
Applied Cryptography and Network Security Workshops
Applied Cryptography and Network Security Workshops
ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
Andreoni
Applied Cryptography and Network Security Workshops
Applied Cryptography and Network Security Workshops
ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
Anisetti / Ardagna / Damiani
A Journey into Security Certification
A Journey into Security Certification
From the Cloud to Artificial Intelligence
Ait Wakrime / Navarro-Arribas / Cuppens / Benaini
Risks and Security of Internet and Systems
Risks and Security of Internet and Systems
18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers
Smith / Wu
Selected Areas in Cryptography
Selected Areas in Cryptography
29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers