Netzwerksicherheit
Checklisten Handbuch IT-Grundschutz
Checklisten Handbuch IT-Grundschutz
Prüfaspekte des IT-Grundschutz-Kompendiums (Stand 6. Edition)
8., aktualisierte Auflage
Sawik
Stochastic Programming in Supply Chain Risk Management
Stochastic Programming in Supply Chain Risk Management
Resilience, Viability, and Cybersecurity
Huang / Parisi / Tan / Ma / Zhang
Web3 Applications Security and New Security Landscape
Web3 Applications Security and New Security Landscape
Theories and Practices
Shafie-khah / Gazafroudi
Trading in Local Energy Markets and Energy Communities
Trading in Local Energy Markets and Energy Communities
Concepts, Structures and Technologies
Reiss
Konzepte für Compliance, Agilität und Digitalisierung
Kebschull
Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III
Rass / Schauer / König
Cyber-Security in kritischen Infrastrukturen
Cyber-Security in kritischen Infrastrukturen
Ein spieltheoretischer Ansatz
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV
Tchakounte / Atemkeng / Rajagopalan
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings
Parkinson / Nikitas / Vallati
Deception in Autonomous Transport Systems
Deception in Autonomous Transport Systems
Threats, Impacts and Mitigation Policies
Anisetti / Ardagna / Damiani
A Journey into Security Certification
A Journey into Security Certification
From the Cloud to Artificial Intelligence
Sarker
AI-Driven Cybersecurity and Threat Intelligence
AI-Driven Cybersecurity and Threat Intelligence
Cyber Automation, Intelligent Decision-Making and Explainability
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I
Smith / Wu
Selected Areas in Cryptography
Selected Areas in Cryptography
29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers