Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in European University Institute Library.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in European University Institute Library.
- Label
- Computer security
116 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- 97 Things Every Information Security Professional Should Know : collective wisdom from the experts
- 99 privacy breaches to beware of : practical data protection tips from real-life experiences
- Advance Metadata Fair : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia
- Algorithms and Architectures for Parallel Processing : 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III
- An Intellectual freedom primer
- Attribute-based Credentials for Trust : Identity in the Information Society
- Beginning security with Microsoft technologies : protecting Office 365, devices, and data
- Big Data and Social Media Analytics : Trending Applications
- Bitskrieg : the new challenge of cyberwarfare
- Blockchain technology and applications
- Building Trust in Information : Perspectives on the Frontiers of Provenance
- Building the Infrastructure for Cloud Security : A Solutions View
- Coding democracy : how hackers are disrupting power, surveillance, and authoritarianism
- Cognitive Superiority : Information to Power
- Cognitive hack : the new battleground in cybersecurity... the human mind
- Computational data and social networks : 9th international conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020 : proceedings
- Computer viruses and anti-virus warfare
- Cracking codes with Python : an introduction to building and breaking ciphers
- Crypto : how the code rebels beat the government - saving privacy in a digital age
- Cryptography, a primer
- Cyber Security : 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers
- Cyber Security, Artificial Intelligence, Data Protection & the Law
- Cyber Weaponry : Issues and Implications of Digital Arms
- Cyber insecurity : navigating the perils of the next information age
- Cyber security awareness for CEOs and management
- Cybercrime-- cyberterrorism-- cyberwarfare-- : averting an electronic Waterloo
- Cyberphobia : identity, trust, security and the Internet
- Cybersecurity
- Cybersecurity and decision makers : data security and digital trust
- Cybersecurity for business : organization-wide strategies to ensure cyber risk is not just an IT issue
- Cybersecurity in the COVID-19 Pandemic
- Cybersecurity law : disciplina italiana ed europea della sicurezza cibernetica anche alla luce delle norme tecniche
- Cyberspace : Risks and Benefits for Society, Security and Development
- Data Protection and Privacy: (In)visibilities and Infrastructures
- Data Protection in the Internet
- Defense against the black arts : how hackers do what they do and how to protect against it
- Designing for Privacy and its Legal Framework : Data Protection by Design and Default for the Internet of Things
- Digital Risk Governance : Security Strategies for the Public and Private Sectors
- Digital privacy : theory, technologies, and practices
- Droit du commerce eĺectronique : documents internationaux
- EU Personal Data Protection in Policy and Practice
- Encyclopedia of information ethics and security
- Enforcing Privacy : Regulatory, Legal and Technological Approaches
- Facing cyber threats head on : protecting yourself and your business
- FinTech and Data Privacy in Germany : An Empirical Analysis with Policy Recommendations
- Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
- GDPR and Biobanking : Individual Rights, Public Interest and Research Regulation across Europe
- GDPR and cyber security for business information systems
- Game Theory for Cyber Deception : From Theory to Applications
- Game Theory for Security and Risk Management : From Theory to Practice
- Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
- Human Security in China : A Post-Pandemic State
- Information system security guidelines for the United Nations organizations
- International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019
- Introduction to computer security
- Investigative data mining for security and criminal detection
- Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization
- Law, policy, and the Internet
- Legal Aspects of Ethnic Data Collection and Positive Action : The Roma Minority in Europe
- Machine learning and security : protecting systems with data and algorithms
- Making our world : the hacker and maker movements in context
- Managing information risks : threats, vulnerabilities, and responses
- National cyber emergencies : the return to civil defence
- Nuclear Non-proliferation and Arms Control Verification : Innovative Systems Concepts
- Organized chaos : reimagining the internet
- Preparing for Digital Disruption
- Principles of Security and Trust : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
- Principles of Security and Trust : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
- Privacy and Data Protection Seals
- Privacy is hard and seven other myths : achieving privacy through careful design
- Privacy is power : why and how you should take back control of your data
- Privacy, Data Protection and Cybersecurity in Europe
- Protecting critical infrastructures against cyber-attack
- Quantum Algorithms for Cryptographically Significant Boolean Functions : An IBMQ Experience
- Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry
- Regulating New Technologies in Uncertain Times
- Risk analysis and security countermeasure selection
- Risk centric threat modeling : process for attack simulation and threat analysis
- Routledge handbook of international cybersecurity
- Secondary Liability of Internet Service Providers
- Security Rights in Intellectual Property
- Security and Defence in Europe
- Security and resilience in intelligent data-centric systems and communication networks
- Security engineering : a guide to building dependable distributed systems
- Security in distributed, grid, mobile, and pervasive computing
- Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
- Semi-state actors in cybersecurity
- Sensemaking for Security
- Symbiotic Interaction : 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29-30, 2016, Revised Selected Papers
- Technology and the Intelligence Community : Challenges and Advances for the 21st Century
- The Darknet and Smarter Crime : Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy
- The Deviant Security Practices of Cyber Crime
- The Ethics of Cybersecurity
- The Huawei and Snowden Questions : Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
- The Internet in everything : freedom and security in a world with no off switch
- The Oxford handbook of cyber security
- The Quest to Cyber Superiority : Cybersecurity Regulations, Frameworks, and Strategies of Major Economies
- The art of computer virus research and defense
- The art of deception : controlling the human element of security
- The crypto controversy : a key conflict in the Information Society
- The cybersecurity manager's guide : the art of building your security program
- The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity
- The hacked world order : how nations fight, trade, maneuver, and manipulate in the digital age
- The myths of security : what the computer security industry doesn't want you to know
- The rise of the computer state
- The security risk assessment handbook : a complete guide for performing security risk assessments
- The wires of war : technology and the global struggle for power
- Thinking security : stopping next year's hackers
- Trust, computing, and society
- Trust, computing, and society
- Unauthorized Access : The Crisis in Online Privacy and Security
- Understanding new security threats
- Well Packed - Not a Bit Too Much : Compression of Digital Data Explained in an Understandable Way
- Windows security monitoring : Scenarios and patterns
- Wireless Internet security : architecture and protocols
- World of walls : the structure, roles and effectiveness of separation barriers
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>