Netzwerksicherheit
Checklisten Handbuch IT-Grundschutz
Checklisten Handbuch IT-Grundschutz
Prüfaspekte des IT-Grundschutz-Kompendiums (Stand 6. Edition)
8., aktualisierte Auflage
Sawik
Stochastic Programming in Supply Chain Risk Management
Stochastic Programming in Supply Chain Risk Management
Resilience, Viability, and Cybersecurity
Huang / Parisi / Tan / Ma / Zhang
Web3 Applications Security and New Security Landscape
Web3 Applications Security and New Security Landscape
Theories and Practices
Shafie-khah / Gazafroudi
Trading in Local Energy Markets and Energy Communities
Trading in Local Energy Markets and Energy Communities
Concepts, Structures and Technologies
Reiss
Konzepte für Compliance, Agilität und Digitalisierung
Kebschull
Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
Rass / Schauer / König
Cyber-Security in kritischen Infrastrukturen
Cyber-Security in kritischen Infrastrukturen
Ein spieltheoretischer Ansatz
Anisetti / Ardagna / Damiani
A Journey into Security Certification
A Journey into Security Certification
From the Cloud to Artificial Intelligence
Almeida / Di Ciccio / Kalloniatis
Advanced Information Systems Engineering Workshops
Advanced Information Systems Engineering Workshops
CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings
Rannenberg / Drogkaris / Lauradoux
Privacy Technologies and Policy
Privacy Technologies and Policy
11th Annual Privacy Forum, APF 2023, Lyon, France, June 1–2, 2023, Proceedings
Tchakounte / Atemkeng / Rajagopalan
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings
Parkinson / Nikitas / Vallati
Deception in Autonomous Transport Systems
Deception in Autonomous Transport Systems
Threats, Impacts and Mitigation Policies
Smith / Wu
Selected Areas in Cryptography
Selected Areas in Cryptography
29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers
Chen / Xia
Blockchain Technology and Emerging Applications
Blockchain Technology and Emerging Applications
Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings
Ould Abdeslam
Artificial Intelligence to Support Proactive Management of Energy Consumption
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II