61
Published 2019
Springer International Publishing
Table of Contents: ... -- Web and Usable Security -- Cryptanalysis on Symmetric-Key Primitives -- Forensics...

62
Published 2015
Springer International Publishing
Subjects: ...Data and Information Security...

63
by Hope, Paco
Published 2008
O'Reilly Media
Subjects: ...Web sites / Security measures / blmlsh...

64
by McNeela, Thomas
Published 2020
Packt Publishing
... security tasks About This Video Learn individual information security techniques using Python Use several...

65
Published 2018
Springer International Publishing
Table of Contents: ...Access control -- Language-based security -- Malicious software -- Network security -- Cloud...

66
Published 2021
Springer International Publishing
Table of Contents: ... in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page...

67
by Schreck, J.
Published 2003
Springer Netherlands
Table of Contents: ...0 Introduction -- 1. User Modeling -- 2. Privacy -- 3. Security -- 4. Requirements for Anonymity...

68
by Chalk, Peter
Published 2008
RAND
Table of Contents: ... to the United States -- Threat priorities -- Principal security initiatives spearheaded by the United States...

69
Published 2022
Springer Nature Singapore
Table of Contents: ...Chapter 1. A systematic approach for analyzing log files based on string matching regular...

70
Published 2024
Springer Nature Singapore
Table of Contents: ... Network for Endoscopic Grading of Intestinal Metaplasia -- Secure Position-aware Graph Neural Networks...

71
Published 2014
Springer International Publishing
Table of Contents: ...-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust...

72
Published 2019
Springer International Publishing
Table of Contents: ...A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation -- Security...

73
Published 2023
Springer Nature Switzerland
Table of Contents: ... for Quantifying the Security Situation of Wireless Data Networks -- Overlapping community discovery algorithm...

74
Published 2014
Springer International Publishing
Table of Contents: ... Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice...

75
Published 2024
Springer Nature Singapore
Table of Contents: ...Fine-grained Searchable Encryption Scheme -- Fine-grained Authorized Secure Deduplication...

76
Published 2019
Springer International Publishing
Table of Contents: ... of Safety-Security Assurance -- The SISTER approach for Verification and Validation: a lightweight process...

77
Published 2006
Springer US
Table of Contents: ... Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures -- Security in Mobile...

78
by Vora, Zeal
Published 2017
Packt Publishing
Table of Contents: ... -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture...

79
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...

80
Published 2015
Springer International Publishing
Table of Contents: ...Security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks -- network...