Computer security
Label
Computer security
Name
Computer security
Focus
Actions
Incoming Resources
- Data Protection and Privacy: (In)visibilities and Infrastructures, edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
- Computer viruses and anti-virus warfare, Jan Hruska
- Attribute-based Credentials for Trust, Identity in the Information Society, edited by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
- The Internet in everything, freedom and security in a world with no off switch, Laura DeNardis
- Security and resilience in intelligent data-centric systems and communication networks, edited by Massimo Ficco, Francesco Palmieri
- Nuclear Non-proliferation and Arms Control Verification, Innovative Systems Concepts, edited by Irmgard Niemeyer, Mona Dreicer, Gotthard Stein
- Data Protection in the Internet, edited by Dário Moura Vicente, Sofia de Vasconcelos Casimiro
- Cognitive hack, the new battleground in cybersecurity... the human mind, James Bone
- Building Trust in Information, Perspectives on the Frontiers of Provenance, edited by Victoria L. Lemieux
- Well Packed - Not a Bit Too Much, Compression of Digital Data Explained in an Understandable Way, by Olaf Manz
- Wireless Internet security, architecture and protocols, James Kempf
- Managing information risks, threats, vulnerabilities, and responses, William Saffady
- Human Security in China, A Post-Pandemic State, edited by Chi Zhang
- Technology and the Intelligence Community, Challenges and Advances for the 21st Century, edited by Margaret E. Kosal
- International Symposium on Mathematics, Quantum Theory, and Cryptography, Proceedings of MQC 2019, edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
- Cybersecurity first principles, a reboot of strategy and tactics, Rick Howard
- The Oxford handbook of cyber security, edited by Paul Cornish
- 99 privacy breaches to beware of, practical data protection tips from real-life experiences, Kevin Shepherdson, William Hioe & Lyn Boxall
- The cybersecurity manager's guide, the art of building your security program, Todd Barnum
- Privacy and Data Protection Seals, edited by Rowena Rodrigues, Vagelis Papakonstantinou
- Trust, computing, and society, edited by Richard H. R. Harper, Microsoft Research Cambridge
- Semi-state actors in cybersecurity, Florian J. Egloff
- Symbiotic Interaction, 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29-30, 2016, Revised Selected Papers, edited by Luciano Gamberini, Anna Spagnolli, Giulio Jacucci, Benjamin Blankertz, Jonathan Freeman
- Real-time Security Extensions for EPCglobal Networks, Case Study for the Pharmaceutical Industry, by Matthieu-P. Schapranow
- Cyber Security, 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers, edited by Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou
- Big Data and Social Media Analytics, Trending Applications, edited by Mehmet Çakırtaş, Mehmet Kemal Ozdemir
- Net zeros and ones, how data erasure promotes sustainability, privacy, and security, Richard Stiennon, Russ B. Ernst, Fredrik Forslund ; [foreword by Mikko Hyppönen]
- Designing for Privacy and its Legal Framework, Data Protection by Design and Default for the Internet of Things, by Aurelia Tamò-Larrieux
- Organized chaos, reimagining the internet, edited by Marck Raymond and Gordon Smith
- Facing cyber threats head on, protecting yourself and your business, Brian Minick
- The rise of the computer state, David Burnham ; foreword by Walter Cronkite
- Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense, edited by Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos
- Cryptography, a primer, Alan G. Konheim
- Beginning security with Microsoft technologies, protecting Office 365, devices, and data, Vasantha Lakshmi
- The Huawei and Snowden Questions, Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?, by Olav Lysne
- FinTech and Data Privacy in Germany, An Empirical Analysis with Policy Recommendations, by Gregor Dorfleitner, Lars Hornuf
- Information system security guidelines for the United Nations organizations, the Advisory Committee for the Co-ordination of Information Systems (ACCIS)
- Law, policy, and technology, cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors
- Protecting critical infrastructures against cyber-attack, Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst
- The myths of security, what the computer security industry doesn't want you to know, John Viega
- Unauthorized Access, The Crisis in Online Privacy and Security, Robert Sloan
- Principles of Security and Trust, 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, edited by Lujo Bauer, Ralf Küsters
- Trust, computing, and society, edited by Richard H. R. Harper
- Principles of Security and Trust, 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, edited by Flemming Nielson, David Sands
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- Secondary Liability of Internet Service Providers, edited by Graeme B. Dinwoodie
- Cyber security awareness for CEOs and management, David Willson ; contributing editor, Henry Dalziel
- EU Personal Data Protection in Policy and Practice, by Bart Custers, Alan M. Sears, Francien Dechesne, Ilina Georgieva, Tommaso Tani, Simone van der Hof
- Cyber Weaponry, Issues and Implications of Digital Arms, edited by Henry Prunckun
- Cyber insecurity, navigating the perils of the next information age, edited by Richard M. Harrison and Trey Herr
Outgoing Resources
- Focus1