Netzwerksicherheit
Checklisten Handbuch IT-Grundschutz
Checklisten Handbuch IT-Grundschutz
Prüfaspekte des IT-Grundschutz-Kompendiums (Stand 6. Edition)
8., aktualisierte Auflage
Sawik
Stochastic Programming in Supply Chain Risk Management
Stochastic Programming in Supply Chain Risk Management
Resilience, Viability, and Cybersecurity
Huang / Parisi / Tan / Ma / Zhang
Web3 Applications Security and New Security Landscape
Web3 Applications Security and New Security Landscape
Theories and Practices
Shafie-khah / Gazafroudi
Trading in Local Energy Markets and Energy Communities
Trading in Local Energy Markets and Energy Communities
Concepts, Structures and Technologies
Reiss
Konzepte für Compliance, Agilität und Digitalisierung
Kebschull
Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
Smith / Wu
Selected Areas in Cryptography
Selected Areas in Cryptography
29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers
Rass / Schauer / König
Cyber-Security in kritischen Infrastrukturen
Cyber-Security in kritischen Infrastrukturen
Ein spieltheoretischer Ansatz
Andreoni
Applied Cryptography and Network Security Workshops
Applied Cryptography and Network Security Workshops
ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
Andreoni
Applied Cryptography and Network Security Workshops
Applied Cryptography and Network Security Workshops
ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
Parkinson / Nikitas / Vallati
Deception in Autonomous Transport Systems
Deception in Autonomous Transport Systems
Threats, Impacts and Mitigation Policies
Bieker / de Conca / Gruschka / Jensen / Schiering
Privacy and Identity Management. Sharing in a Digital World
Privacy and Identity Management. Sharing in a Digital World
18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII
Joye / Leander
Advances in Cryptology – EUROCRYPT 2024
Advances in Cryptology – EUROCRYPT 2024
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I