1
by Mehan, Julie E.
Published 2014
IT Governance Pub.
Subjects: ...Computer security...

2
Published 2015
Elsevier
Subjects: ...Computer security...

3
Published 2021
CRC Press
Subjects: ...Computer Security...

4
Published 2020
Springer International Publishing
Subjects: ...Computer security...

5
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Software Security by Example -- Software Reverse Engineering -- Trusted Computing -- Security via Trusted...

6
Published 2018
Springer International Publishing
Table of Contents: ...Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy...

7
by Neely, Matthew
Published 2013
Elsevier/Syngress
Subjects: ...Penetration testing (Computer security) / fast...

8
Published 2022
Springer International Publishing
Subjects: ...Computer security...

9
Published 2022
CRC Press
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

10
Published 2018
Springer International Publishing
Subjects: ...Computer security...

11
by Sorebo, Gilbert N.
Published 2012
CRC Press
Subjects: ...COMPUTERS / Security / General / bisacsh...

12
by Zdziarski, Jonathan A.
Published 2008
O'Reilly Media
Subjects: ...Mobile computing / Security measures...

13
by Sachowski, Jason
Published 2019
CRC Press
Subjects: ...COMPUTERS / Security / General / bisacsh...

14
by Tamma, Rohit, Skulkin, Oleg, Mahalik, Heather, Bommisetty, Satish
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

15
by Zhang, Yushu, Xiang, Yong, Zhang, Leo Yu
Published 2019
Springer Nature Singapore
Table of Contents: ...Introduction -- Secure Compressive Sensing -- Multimedia Data Security -- Cloud Computing Security...

16
by Srinivasan, S.
Published 2014
Springer New York
Table of Contents: ... Computing Providers -- Cloud Computing Security -- Assessing Cloud Computing for Business Use -- Hidden...

17
Published 2022
Springer International Publishing
Table of Contents: ...Introduction -- Basics of Internet of Things and Fog Computing -- Secure Multi-Layer Fog Computing...

18
Published 2012
Springer Netherlands
Table of Contents: ...Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security...

19
Published 2022
Springer International Publishing
Table of Contents: ... Systems -- Signal Processing and Real-Time Systems -- Computer Security -- Digital Governance and Smart...

20
Published 2015
Springer Berlin Heidelberg
Table of Contents: ...Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security...