1
Information Systems [E-Book] : 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, Virtual Event, December 21-22, 2022, Proceedings /
2
Cyber Deception [E-Book] : Techniques, Strategies, and Human Aspects /
3
Cybersecurity Teaching in Higher Education [E-Book] /
4
Blockchain Scalability [E-Book] /
Subject (ZB): ...Computer security....

Full text 
5
Hacking Kubernetes : threat-driven analysis and defense /
Book
Subject (ZB): ...computer security...
Table of Contents 
6
Netzwerke mit Windows 11 : für Zuhause und Selbstständige /
Book
Subject (ZB): ...computer security...
Table of Contents 
7
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authetication and more /
Book
8
Data analytics for cybersecurity [E-Book] /
Subject (ZB): ...Computer security -- Data processing....

Full text 
9
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants [E-Book] /
10
Information Systems [E-Book] : 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8-9, 2021, Proceedings /
11
Practical cyber threat intelligence [E-Book] /
Subject (ZB): ...Cyber intelligence (Computer security)...

Full text 
12
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment [E-Book] /
13
Security Architecture - How and Why [E-Book]
Subject (ZB): ...Computer security....

Full text 
14
Evolving Technologies for Computing, Communication and Smart World [E-Book] : Proceedings of ETCCS 2020 /
15
Advanced Information Systems Engineering Workshops [E-Book] : CAiSE 2021 International Workshops, Melbourne, VIC, Australia, June 28 - July 2, 2021, Proceedings /
16
Service-Oriented Computing  - ICSOC 2020 Workshops [E-Book] : AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings /
17
Technology-Augmented Perception and Cognition [E-Book] /
18
Fog/Edge Computing For Security, Privacy, and Applications [E-Book] /
19
The Theory of Hash Functions and Random Oracles [E-Book] : An Approach to Modern Cryptography /
20
Blockchain Technology and Application [E-Book] : Third CCF China Blockchain Conference, CBCC 2020, Jinan, China, December 18-20, 2020, Revised Selected Papers /