Výsledky vyhledávání - "thema EDItEUR::U Computing and Information Technology::UR Computer security"
-
1
Autoři:
Témata: COVID-19 Pandemic,Supply Chain Management,UNSDGs,Cybersecurity,Big Data,Blockchain, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDH E-book readers, tablets and other portable devices: consumer / user guides, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TD Industrial chemistry and manufacturing technologies
Popis souboru: image/jpeg; application/pdf
-
2
Autoři:
Zdroj: SpringerBriefs in Computer Science ISBN: 9783031805035
Témata: safety-critical systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, safety documents, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPQ Decision theory: general::GPQD Risk assessment, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, functional safety, thema EDItEUR::U Computing and Information Technology::UK Computer hardware, software verification and validation, risk management, software safety
Popis souboru: image/jpeg; application/pdf
-
3
Autoři: a další
Témata: economic cyber security, national economy, state regulatory policy, semantic role labeling, thema EDItEUR::U Computing and Information Technology::UR Computer security, circular economy, strategically important enterprises, modular number system, thema EDItEUR::K Economics, Finance, Business and Management, non-positional number system, Integer economic data processing systems, intrusion detection systems, institutional support, natural language processing, national security, monitoring financial security, unauthorized access
Popis souboru: image/jpeg
-
4
Autoři: a další
Přispěvatelé: a další
Témata: crypto-code constructions, Cybersecurity, thema EDItEUR::U Computing and Information Technology::UR Computer security, simulation modelling, radio engineering research, models of the threat, automation, security measures
Popis souboru: image/jpeg
-
5
Autoři:
Zdroj: Advanced Studies in Diginomics and Digitalization ISBN: 9783031320637
Témata: Data Regulation, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJH Entrepreneurship / Start-ups, Data Privacy, thema EDItEUR::U Computing and Information Technology::UR Computer security, Platform Economics, Crowdsourcing, thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNC Company, commercial and competition law: general, Crowdfounding, Digitalization, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, Data Protection, thema EDItEUR::K Economics, Finance, Business and Management::KF Finance and accounting::KFF Finance and the finance industry
Popis souboru: image/jpeg; application/pdf
Přístupová URL adresa: https://directory.doabooks.org/handle/20.500.12854/112844
https://library.oapen.org/bitstream/20.500.12657/75388/1/978-3-031-32064-4.pdf
https://library.oapen.org/handle/20.500.12657/75388
https://link.springer.com/978-3-031-32064-4
https://library.oapen.org/handle/20.500.12657/75388 -
6
Autoři: Čtvrtník, Mikuláš
Témata: Archives and human rights, thema EDItEUR::N History and Archaeology::NH History::NHA History: theory and methods::NHAH Historiography, thema EDItEUR::U Computing and Information Technology::UR Computer security, Privacy protection, Personal data storage, Privacy rights, Right to be forgotten, thema EDItEUR::D Biography, Literature and Literary studies::D Biography, Literature and Literary studies::DS Literature: history and criticism, Archiving, Post-mortem privacy
Popis souboru: image/jpeg; application/pdf
Přístupová URL adresa: https://library.oapen.org/handle/20.500.12657/60821
https://library.oapen.org/bitstream/20.500.12657/60821/1/978-3-031-18667-7.pdf
https://directory.doabooks.org/handle/20.500.12854/96230
https://link.springer.com/978-3-031-18667-7
https://library.oapen.org/handle/20.500.12657/60821 -
7
Autoři: Julius Holderer
Témata: IT-Security, 9. Industry and infrastructure, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security and Privacy, 16. Peace & justice, thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection, 12. Responsible consumption, Process Mining, Process Automation, Petri Net, Data Mining, Process Modeling, Process Security, Business Process Management, Compliance
Popis souboru: image/jpeg; application/pdf; pdf
Přístupová URL adresa: https://library.oapen.org/handle/20.500.12657/57935
https://directory.doabooks.org/handle/20.500.12854/91298
https://library.oapen.org/bitstream/20.500.12657/57935/1/978-3-658-38154-7.pdf
https://link.springer.com/978-3-658-38154-7
https://library.oapen.org/handle/20.500.12657/57935 -
8
Autoři:
Témata: thema EDItEUR::U Computing and Information Technology::UR Computer security, Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence
Popis souboru: image/jpeg; application/pdf
-
9
Přispěvatelé:
Témata: Open Access, Autonomous Systems, Generative AI, Large Language Models, Zero Trust Architecture, CyberPhysical Systems, UAV Swarms, Secure Communications, Distributed Intelligence, Real-Time Anomaly Detection, Machine Learning, Robotics, Security and Resilience, AI-Driven Approaches, Secure Autonomy, Safety-Critical Systems, Fault Mitigation, Swarm Intelligence, Secure Computing, Autonomous Robotics, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQM Machine learning, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, Industrial processes::TR Transport technology and trades
Popis souboru: image/jpeg
Relation: Artificial Intelligence (R0); ONIX_20251128T131701_9789819510504_45; https://library.oapen.org/handle/20.500.12657/108702; https://library.oapen.org/bitstream/20.500.12657/108702/1/9789819510504.pdf
-
10
Přispěvatelé:
Témata: energy management, renewable energy, Smart IoT, Sustainable Development Goals (SDG), Sustainable cities and communities, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UL Operating systems::ULR Real time operating systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKC Supercomputers, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
Popis souboru: image/jpeg
Relation: ONIX_20251022T133414_9781040425046_4; https://library.oapen.org/handle/20.500.12657/107727; https://library.oapen.org/bitstream/20.500.12657/107727/1/9781040425046.pdf
-
11
Přispěvatelé: Sen, Jaydip
Popis souboru: image/jpeg
Relation: ONIX_20250220_9781837696758_137; https://www.intechopen.com/books/1003954
-
12
Autoři:
Zdroj: external_content.pdf
Témata: Computers, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography::RGC Human geography, Data Science, Science & Technology Studies, Computer Science, Population Studies, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects, bic Book Industry Communication::U Computing & information technology::UN Databases::UNC Data capture & analysis
Popis souboru: image/jpeg; application/pdf
Přístupová URL adresa: https://directory.doabooks.org/handle/20.500.12854/116099
https://www.jstor.org/stable/10.2307/j.ctv249sg9w
https://library.oapen.org/handle/20.500.12657/93679
https://directory.doabooks.org/handle/20.500.12854/146176
https://library.oapen.org/bitstream/20.500.12657/93679/1/external_content.pdf
https://library.oapen.org/handle/20.500.12657/93679 -
13
Autoři: a další
Přispěvatelé: a další
Témata: Modeling of conflict-cooperative interaction, Cybersecurity, Algebraic geometric codes, thema EDItEUR::U Computing and Information Technology::UR Computer security, Crypto-code constructions, Classifiers of cyber threats
Popis souboru: image/jpeg
-
14
Autoři:
Zdroj: Research for Policy ISBN: 9783030778378
Schrijvers, E, Prins, C & Passchier, R 2021, Preparing for digital disruption . Research for Policy, Springer Netherlands . https://doi.org/10.1007/978-3-030-77838-5Témata: Critical Infrastructures, Cyber War, thema EDItEUR::U Computing and Information Technology::UR Computer security, Cyber Attacks, Critical Information Infrastructures, Cyber Insurance, Crisis Contingency Planning, thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology, 16. Peace & justice, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, Open Access, Disaster, Crisis Management, Cyber Security Policy, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administration, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
Popis souboru: image/jpeg; application/pdf
-
15
Autoři: Blum, Dan
Zdroj: 2020_Book_RationalCybersecurityForBusine.pdf
Témata: Cybersecurity strategy, Agile security, Cybersecurity, Cyber-resilience, Security governance, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security culture, Rational Cybersecurity, Cybersecurity maturity model, Business Alignment, Rational cybersecurity, Shared responsibility, Modern identity, Leaders' Guide, Security championship, Open Access, Risk management, Cybersecurity RACIs, Computer security, Computer Science, Protección de datos, Security, DevSecOps, Sistemas de seguridad, Seguridad informática
Popis souboru: image/jpeg; application/pdf; 349 páginas
Přístupová URL adresa: https://library.oapen.org/handle/20.500.12657/41762
https://library.oapen.org/bitstream/20.500.12657/41762/1/2020_Book_RationalCybersecurityForBusine.pdf
https://directory.doabooks.org/handle/20.500.12854/30469
https://library.oapen.org/handle/20.500.12657/41762
https://www.springer.com/9781484259528 -
16
Autoři: a další
Témata: Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security, Protección de datos, Seguridad informática - Normas, Computer communication systems, Demystifying internet, Information technology, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, Platform security, Computer science, Economía, Business—Data processing
Popis souboru: image/jpeg; application/pdf; 515 páginas
Přístupová URL adresa: https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
http://library.oapen.org/handle/20.500.12657/22840
https://directory.doabooks.org/handle/20.500.12854/39473
http://library.oapen.org/handle/20.500.12657/22840
https://www.springer.com/9781484228968 -
17
Přispěvatelé:
Témata: Privacy, Data privacy, Surveillance, Surveillance Capitalism, Web 3, Cybersecurity, Virtual Worlds, Internet, Oppression, Healthcare data privacy, Supply chain privacy, Document privacy, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJD Business innovation, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, Business and Management::KJ Business and Management::KJQ Business mathematics and systems
Popis souboru: application/pdf
Relation: Technology, Work and Globalization; ONIX_20240613_9783031510632_3
-
18
Přispěvatelé: a další
Témata: Cyber Crime, Cyber Terrorism, Cyber Security, Border and External Security, Serious and Organized Crime, Critical Infrastructures Protection, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
Popis souboru: application/pdf
Relation: Security Informatics and Law Enforcement; ONIX_20241021_9783031620836_11
-
19
Přispěvatelé: a další
Témata: large language models, cybersecurity, cyberdefense, neural networks, societal implications, risk management, LLMs, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security
Popis souboru: application/pdf
Relation: ONIX_20240613_9783031548277_11
-
20
Přispěvatelé:
Témata: Warfare and defence, International relations, Computer security, Ethical and social aspects of IT, thema EDItEUR::J Society and Social Sciences::JW Warfare and defence, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects
Popis souboru: image/jpeg
Relation: Beyond Boundaries; OCN: 1402763380; https://library.oapen.org/handle/20.500.12657/87415; https://library.oapen.org/bitstream/20.500.12657/87415/1/9781773854045_OA.pdf
Nájsť tento článok vo Web of Science