Search Results - thema EDItEUR::U Computing and Information Technology::UR Computer security
-
1
Authors:
Source: SpringerBriefs in Computer Science ISBN: 9783031805035
Subject Terms: safety-critical systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, safety documents, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPQ Decision theory: general::GPQD Risk assessment, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, functional safety, thema EDItEUR::U Computing and Information Technology::UK Computer hardware, software verification and validation, risk management, software safety
File Description: image/jpeg; application/pdf
-
2
Authors:
Subject Terms: COVID-19 Pandemic,Supply Chain Management,UNSDGs,Cybersecurity,Big Data,Blockchain, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDH E-book readers, tablets and other portable devices: consumer / user guides, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TD Industrial chemistry and manufacturing technologies
File Description: image/jpeg; application/pdf
-
3
Authors: et al.
Subject Terms: economic cyber security, national economy, state regulatory policy, semantic role labeling, thema EDItEUR::U Computing and Information Technology::UR Computer security, circular economy, strategically important enterprises, modular number system, thema EDItEUR::K Economics, Finance, Business and Management, non-positional number system, Integer economic data processing systems, intrusion detection systems, institutional support, natural language processing, national security, monitoring financial security, unauthorized access
File Description: image/jpeg
-
4
Authors: et al.
Contributors: et al.
Subject Terms: crypto-code constructions, Cybersecurity, thema EDItEUR::U Computing and Information Technology::UR Computer security, simulation modelling, radio engineering research, models of the threat, automation, security measures
File Description: image/jpeg
-
5
Authors: Julius Holderer
Subject Terms: IT-Security, 9. Industry and infrastructure, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security and Privacy, 16. Peace & justice, thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection, 12. Responsible consumption, Process Mining, Process Automation, Petri Net, Data Mining, Process Modeling, Process Security, Business Process Management, Compliance
File Description: image/jpeg; application/pdf; pdf
-
6
Authors: Čtvrtník, Mikuláš
Subject Terms: Archives and human rights, thema EDItEUR::N History and Archaeology::NH History::NHA History: theory and methods::NHAH Historiography, thema EDItEUR::U Computing and Information Technology::UR Computer security, Privacy protection, Personal data storage, Privacy rights, Right to be forgotten, thema EDItEUR::D Biography, Literature and Literary studies::D Biography, Literature and Literary studies::DS Literature: history and criticism, Archiving, Post-mortem privacy
File Description: image/jpeg; application/pdf
-
7
Authors: et al.
Subject Terms: Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security, Protección de datos, Seguridad informática - Normas, Computer communication systems, Demystifying internet, Information technology, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, Platform security, Computer science, Economía, Business—Data processing
File Description: image/jpeg; application/pdf; 515 páginas
Access URL: https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
http://library.oapen.org/handle/20.500.12657/22840
https://directory.doabooks.org/handle/20.500.12854/39473
http://library.oapen.org/handle/20.500.12657/22840
https://www.springer.com/9781484228968 -
8
Authors:
Source: Advanced Studies in Diginomics and Digitalization ISBN: 9783031320637
Subject Terms: Data Regulation, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJH Entrepreneurship / Start-ups, Data Privacy, thema EDItEUR::U Computing and Information Technology::UR Computer security, Platform Economics, Crowdsourcing, thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNC Company, commercial and competition law: general, Crowdfounding, Digitalization, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, Data Protection, thema EDItEUR::K Economics, Finance, Business and Management::KF Finance and accounting::KFF Finance and the finance industry
File Description: image/jpeg; application/pdf
-
9
Authors: Blum, Dan
Source: 2020_Book_RationalCybersecurityForBusine.pdf
Subject Terms: Cybersecurity strategy, Agile security, Cybersecurity, Cyber-resilience, Security governance, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security culture, Rational Cybersecurity, Cybersecurity maturity model, Business Alignment, Rational cybersecurity, Shared responsibility, Modern identity, Leaders' Guide, Security championship, Open Access, Risk management, Cybersecurity RACIs, Computer security, Computer Science, Protección de datos, Security, DevSecOps, Sistemas de seguridad, Seguridad informática
File Description: image/jpeg; application/pdf; 349 páginas
Access URL: https://library.oapen.org/handle/20.500.12657/41762
https://library.oapen.org/bitstream/20.500.12657/41762/1/2020_Book_RationalCybersecurityForBusine.pdf
https://directory.doabooks.org/handle/20.500.12854/30469
https://library.oapen.org/handle/20.500.12657/41762
https://www.springer.com/9781484259528 -
10
Contributors:
Subject Terms: energy management, renewable energy, Smart IoT, Sustainable Development Goals (SDG), Sustainable cities and communities, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UL Operating systems::ULR Real time operating systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKC Supercomputers, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
File Description: image/jpeg
Relation: ONIX_20251022T133414_9781040425046_4; https://library.oapen.org/handle/20.500.12657/107727; https://library.oapen.org/bitstream/20.500.12657/107727/1/9781040425046.pdf
-
11
Authors: et al.
Contributors: et al.
Subject Terms: Modeling of conflict-cooperative interaction, Cybersecurity, Algebraic geometric codes, thema EDItEUR::U Computing and Information Technology::UR Computer security, Crypto-code constructions, Classifiers of cyber threats
File Description: image/jpeg
-
12
Authors:
Source: Research for Policy ISBN: 9783030778378
Schrijvers, E, Prins, C & Passchier, R 2021, Preparing for digital disruption . Research for Policy, Springer Netherlands . https://doi.org/10.1007/978-3-030-77838-5Subject Terms: Critical Infrastructures, Cyber War, thema EDItEUR::U Computing and Information Technology::UR Computer security, Cyber Attacks, Critical Information Infrastructures, Cyber Insurance, Crisis Contingency Planning, thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology, 16. Peace & justice, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, Open Access, Disaster, Crisis Management, Cyber Security Policy, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administration, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
File Description: image/jpeg; application/pdf
-
13
Authors:
Source: external_content.pdf
Subject Terms: Computers, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography::RGC Human geography, Data Science, Science & Technology Studies, Computer Science, Population Studies, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects, bic Book Industry Communication::U Computing & information technology::UN Databases::UNC Data capture & analysis
File Description: image/jpeg; application/pdf
Access URL: https://directory.doabooks.org/handle/20.500.12854/116099
https://www.jstor.org/stable/10.2307/j.ctv249sg9w
https://library.oapen.org/handle/20.500.12657/93679
https://directory.doabooks.org/handle/20.500.12854/146176
https://library.oapen.org/bitstream/20.500.12657/93679/1/external_content.pdf
https://library.oapen.org/handle/20.500.12657/93679 -
14
Authors:
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security, Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence
File Description: image/jpeg; application/pdf
-
15
Contributors: Sen, Jaydip
File Description: image/jpeg
Relation: ONIX_20250220_9781837696758_137; https://www.intechopen.com/books/1003954
-
16
Contributors: et al.
Subject Terms: Computer science, Data protection, Application software, Data encryption (Computer science), Special purpose computers, Computer communication systems, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, thema EDItEUR::U Computing and Information Technology::UN Databases::UNH Information retrieval, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems
File Description: image/jpeg
Relation: Communications in Computer and Information Science; 1006860; OCN: 1045425569; http://library.oapen.org/handle/20.500.12657/23295; https://library.oapen.org/bitstream/20.500.12657/23295/1/1006860.pdf
-
17
Contributors: et al.
Subject Terms: Cyber Crime, Cyber Terrorism, Cyber Security, Border and External Security, Serious and Organized Crime, Critical Infrastructures Protection, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
File Description: application/pdf
Relation: Security Informatics and Law Enforcement; ONIX_20241021_9783031620836_11
-
18
Contributors: et al.
Subject Terms: Cyber Crime, Cyber Terrorism, Cyber Security, Border and External Security, Serious and Organized Crime, Critical Infrastructures Protection, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
File Description: image/jpeg
Relation: Security Informatics and Law Enforcement; ONIX_20241021_9783031620836_11; https://library.oapen.org/handle/20.500.12657/93842
-
19
Authors: Xiao, Yang
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security, STM, based, Digital and Wireless Communication, IT Security, Mobile, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJK Communications engineering / telecommunications, INFORMATIONSCIENCE, access, SCI-TECH, sensor, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, ElectricalEngineering, protocol, Grid, Pervasive, Computing, ITECH, InfoSECURITY, Distributed, ENG, wireless, routing, networks, hoc, Security, role, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, Networks, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineering, control
File Description: image/png; image/jpeg; application/pdf
Access URL: https://library.oapen.org/bitstream/20.500.12657/41646/1/9780849379253.pdf
https://library.oapen.org/bitstream/20.500.12657/40056/1/9780849379215.pdf
https://directory.doabooks.org/handle/20.500.12854/27558
https://library.oapen.org/handle/20.500.12657/40056
https://library.oapen.org/handle/20.500.12657/40056
https://library.oapen.org/handle/20.500.12657/41646
https://www.taylorfrancis.com/books/9780429119347 -
20
Authors: et al.
Contributors: et al.
Subject Terms: Cybersecurity, models of the threat, crypto-code constructions, simulation modelling, automation, radio engineering research, security measures, thema EDItEUR::U Computing and Information Technology::UR Computer security
File Description: image/jpeg
Nájsť tento článok vo Web of Science