Search alternatives:
information hardware » informatics hardware, information warfare, information aware
information software » integration software, animation software, automation software
hardware monitor » hardware monitoring, hardware mobile
software monitor » software monitoring, software mit, software mining
information hardware » informatics hardware, information warfare, information aware
information software » integration software, animation software, automation software
hardware monitor » hardware monitoring, hardware mobile
software monitor » software monitoring, software mit, software mining
|
by Alsmadi, Izzat, Burdwell, Robert, Aleroud , Ahmed, Wahbeh, Abdallah
Published 2018
Table of Contents:
“...Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities...”Published 2018
Springer International Publishing