-
1921
-
1922
-
1923Published 2018Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
Full Text via HEAL-Link
Electronic eBook -
1924Published 2018Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
Full Text via HEAL-Link
Electronic eBook -
1925Published 2018Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
Full Text via HEAL-Link
Electronic eBook -
1926Published 2018Table of Contents: “… Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.…”
Full Text via HEAL-Link
Electronic eBook -
1927Published 2012Table of Contents: “…Intelligent transport -- Environmental engineering -- Computer security -- Civil engineering…”
Full Text via HEAL-Link
Electronic eBook -
1928Published 2004Table of Contents: “… -- IX Biomedical Applications -- X Detection, Diagnostics, and Computer Security -- XI Other…”
Full Text via HEAL-Link
Electronic eBook -
1929Table of Contents: “…Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert…”
Full Text via HEAL-Link
Electronic eBook -
1930Published 2017Table of Contents: “… -- Modelling and optimization -- Various aspects of computer security.…”
Full Text via HEAL-Link
Electronic eBook -
1931Published 2016Table of Contents: “…Computer Security: Information security, Network Security, Cloud Security, Mobile Security…”
Full Text via HEAL-Link
Electronic eBook -
1932by Srinivasan, S.Table of Contents: “… Computing Providers -- Cloud Computing Security -- Assessing Cloud Computing for Business Use -- Hidden…”
Published 2014
Full Text via HEAL-Link
Electronic eBook -
1933Published 2016Table of Contents: “… -- Knowledge-Based Technologies for Web Applications, Cloud Computing, Security, Algorithms and Computer…”
Full Text via HEAL-Link
Electronic eBook -
1934Published 2012Table of Contents: “…Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy…”
Full Text via HEAL-Link
Electronic eBook -
1935
-
1936
-
1937Published 2010Table of Contents: “… to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network…”
Full Text via HEAL-Link
Electronic eBook -
1938Published 2015Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
Full Text via HEAL-Link
Electronic eBook -
1939Published 2014Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
Full Text via HEAL-Link
Electronic eBook -
1940Published 2012Table of Contents: “…Mobile and ubiquitous computing -- Dependable, reliable and autonomic computing -- Security…”
Full Text via HEAL-Link
Electronic eBook