Suchergebnisse - "thema EDItEUR::U Computing and Information Technology::UR Computer security"
-
1
Autoren:
Schlagwörter: COVID-19 Pandemic,Supply Chain Management,UNSDGs,Cybersecurity,Big Data,Blockchain, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDH E-book readers, tablets and other portable devices: consumer / user guides, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TD Industrial chemistry and manufacturing technologies
Dateibeschreibung: image/jpeg; application/pdf
-
2
Autoren:
Quelle: SpringerBriefs in Computer Science ISBN: 9783031805035
Schlagwörter: safety-critical systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, safety documents, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPQ Decision theory: general::GPQD Risk assessment, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, functional safety, thema EDItEUR::U Computing and Information Technology::UK Computer hardware, software verification and validation, risk management, software safety
Dateibeschreibung: image/jpeg; application/pdf
-
3
Autoren: et al.
Schlagwörter: economic cyber security, national economy, state regulatory policy, semantic role labeling, thema EDItEUR::U Computing and Information Technology::UR Computer security, circular economy, strategically important enterprises, modular number system, thema EDItEUR::K Economics, Finance, Business and Management, non-positional number system, Integer economic data processing systems, intrusion detection systems, institutional support, natural language processing, national security, monitoring financial security, unauthorized access
Dateibeschreibung: image/jpeg
-
4
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: crypto-code constructions, Cybersecurity, thema EDItEUR::U Computing and Information Technology::UR Computer security, simulation modelling, radio engineering research, models of the threat, automation, security measures
Dateibeschreibung: image/jpeg
-
5
Autoren:
Quelle: Advanced Studies in Diginomics and Digitalization ISBN: 9783031320637
Schlagwörter: Data Regulation, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJH Entrepreneurship / Start-ups, Data Privacy, thema EDItEUR::U Computing and Information Technology::UR Computer security, Platform Economics, Crowdsourcing, thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNC Company, commercial and competition law: general, Crowdfounding, Digitalization, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, Data Protection, thema EDItEUR::K Economics, Finance, Business and Management::KF Finance and accounting::KFF Finance and the finance industry
Dateibeschreibung: image/jpeg; application/pdf
-
6
Autoren: Čtvrtník, Mikuláš
Schlagwörter: Archives and human rights, thema EDItEUR::N History and Archaeology::NH History::NHA History: theory and methods::NHAH Historiography, thema EDItEUR::U Computing and Information Technology::UR Computer security, Privacy protection, Personal data storage, Privacy rights, Right to be forgotten, thema EDItEUR::D Biography, Literature and Literary studies::D Biography, Literature and Literary studies::DS Literature: history and criticism, Archiving, Post-mortem privacy
Dateibeschreibung: image/jpeg; application/pdf
-
7
Autoren: Julius Holderer
Schlagwörter: IT-Security, 9. Industry and infrastructure, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security and Privacy, 16. Peace & justice, thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection, 12. Responsible consumption, Process Mining, Process Automation, Petri Net, Data Mining, Process Modeling, Process Security, Business Process Management, Compliance
Dateibeschreibung: image/jpeg; application/pdf; pdf
-
8
Autoren:
Schlagwörter: thema EDItEUR::U Computing and Information Technology::UR Computer security, Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence
Dateibeschreibung: image/jpeg; application/pdf
-
9
Weitere Verfasser:
Schlagwörter: energy management, renewable energy, Smart IoT, Sustainable Development Goals (SDG), Sustainable cities and communities, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UL Operating systems::ULR Real time operating systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKC Supercomputers, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
Dateibeschreibung: image/jpeg
Relation: ONIX_20251022T133414_9781040425046_4; https://library.oapen.org/handle/20.500.12657/107727; https://library.oapen.org/bitstream/20.500.12657/107727/1/9781040425046.pdf
-
10
Weitere Verfasser: Sen, Jaydip
Dateibeschreibung: image/jpeg
Relation: ONIX_20250220_9781837696758_137; https://www.intechopen.com/books/1003954
-
11
Autoren:
Quelle: external_content.pdf
Schlagwörter: Computers, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography::RGC Human geography, Data Science, Science & Technology Studies, Computer Science, Population Studies, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects, bic Book Industry Communication::U Computing & information technology::UN Databases::UNC Data capture & analysis
Dateibeschreibung: image/jpeg; application/pdf
Zugangs-URL: https://directory.doabooks.org/handle/20.500.12854/116099
https://www.jstor.org/stable/10.2307/j.ctv249sg9w
https://library.oapen.org/handle/20.500.12657/93679
https://directory.doabooks.org/handle/20.500.12854/146176
https://library.oapen.org/bitstream/20.500.12657/93679/1/external_content.pdf
https://library.oapen.org/handle/20.500.12657/93679 -
12
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Modeling of conflict-cooperative interaction, Cybersecurity, Algebraic geometric codes, thema EDItEUR::U Computing and Information Technology::UR Computer security, Crypto-code constructions, Classifiers of cyber threats
Dateibeschreibung: image/jpeg
-
13
Autoren:
Quelle: Research for Policy ISBN: 9783030778378
Schrijvers, E, Prins, C & Passchier, R 2021, Preparing for digital disruption . Research for Policy, Springer Netherlands . https://doi.org/10.1007/978-3-030-77838-5Schlagwörter: Critical Infrastructures, Cyber War, thema EDItEUR::U Computing and Information Technology::UR Computer security, Cyber Attacks, Critical Information Infrastructures, Cyber Insurance, Crisis Contingency Planning, thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology, 16. Peace & justice, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, Open Access, Disaster, Crisis Management, Cyber Security Policy, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administration, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
Dateibeschreibung: image/jpeg; application/pdf
-
14
Autoren: Blum, Dan
Quelle: 2020_Book_RationalCybersecurityForBusine.pdf
Schlagwörter: Cybersecurity strategy, Agile security, Cybersecurity, Cyber-resilience, Security governance, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security culture, Rational Cybersecurity, Cybersecurity maturity model, Business Alignment, Rational cybersecurity, Shared responsibility, Modern identity, Leaders' Guide, Security championship, Open Access, Risk management, Cybersecurity RACIs, Computer security, Computer Science, Protección de datos, Security, DevSecOps, Sistemas de seguridad, Seguridad informática
Dateibeschreibung: image/jpeg; application/pdf; 349 páginas
Zugangs-URL: https://library.oapen.org/handle/20.500.12657/41762
https://library.oapen.org/bitstream/20.500.12657/41762/1/2020_Book_RationalCybersecurityForBusine.pdf
https://directory.doabooks.org/handle/20.500.12854/30469
https://library.oapen.org/handle/20.500.12657/41762
https://www.springer.com/9781484259528 -
15
Autoren: et al.
Schlagwörter: Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security, Protección de datos, Seguridad informática - Normas, Computer communication systems, Demystifying internet, Information technology, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, Platform security, Computer science, Economía, Business—Data processing
Dateibeschreibung: image/jpeg; application/pdf; 515 páginas
Zugangs-URL: https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
http://library.oapen.org/handle/20.500.12657/22840
https://directory.doabooks.org/handle/20.500.12854/39473
http://library.oapen.org/handle/20.500.12657/22840
https://www.springer.com/9781484228968 -
16
Weitere Verfasser:
Schlagwörter: Privacy, Data privacy, Surveillance, Surveillance Capitalism, Web 3, Cybersecurity, Virtual Worlds, Internet, Oppression, Healthcare data privacy, Supply chain privacy, Document privacy, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJD Business innovation, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, Business and Management::KJ Business and Management::KJQ Business mathematics and systems
Dateibeschreibung: application/pdf
Relation: Technology, Work and Globalization; ONIX_20240613_9783031510632_3
-
17
Weitere Verfasser: et al.
Schlagwörter: Cyber Crime, Cyber Terrorism, Cyber Security, Border and External Security, Serious and Organized Crime, Critical Infrastructures Protection, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
Dateibeschreibung: application/pdf
Relation: Security Informatics and Law Enforcement; ONIX_20241021_9783031620836_11
-
18
Weitere Verfasser: et al.
Schlagwörter: large language models, cybersecurity, cyberdefense, neural networks, societal implications, risk management, LLMs, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security
Dateibeschreibung: application/pdf
Relation: ONIX_20240613_9783031548277_11
-
19
Weitere Verfasser:
Schlagwörter: Warfare and defence, International relations, Computer security, Ethical and social aspects of IT, thema EDItEUR::J Society and Social Sciences::JW Warfare and defence, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects
Dateibeschreibung: image/jpeg
Relation: Beyond Boundaries; OCN: 1402763380; https://library.oapen.org/handle/20.500.12657/87415; https://library.oapen.org/bitstream/20.500.12657/87415/1/9781773854045_OA.pdf
-
20
Weitere Verfasser: et al.
Schlagwörter: COVID-19 Pandemic,Supply Chain Management,UNSDGs,Cybersecurity,Big Data,Blockchain, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDH E-book readers, tablets and other portable devices: consumer / user guides, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TD Industrial chemistry and manufacturing technologies
Relation: Systems Innovation Book Series; https://library.oapen.org/handle/20.500.12657/95767
Nájsť tento článok vo Web of Science