45  Ergebnisse:
?
1

Geek and hacker stories 

code, culture and storytelling from the technosphere 
Alleyne, Brian , [2019]
 
?
3

Principles of secure processor architecture design 

Synthesis lectures on computer architecture ; #45;Synthesis Lectures on Computer Architecture Ser.
Szefer, Jakub , [2019]
 
?
6

Implementing digital forensic readiness 

from reactive to proactive process 
Sachowski, Jason - Second edition . , [2019]
 
?
8

Privacy in mobile and pervasive computing 

Synthesis lectures on mobile and pervasive computing ; #13;Computer & information science, collection ten;Synthesis digital library of engineering and computer science
 
?
9

Bitcoin und Blockchain - Grundlagen und Programmierung 

die Blockchain verstehen, Anwendungen entwickeln 
Antonopoulos, Andreas M. ; Klicman, Peter - 2. Auflage . , 2018
Link: https://ebookcentral.pro..

Exemplar:  TB BHV: com 680/7(2)
 
?
10

IT-Sicherheit 

Konzepte - Verfahren - Protokolle  De Gruyter Studium
Eckert, Claudia - 10. Auflage . , [2018]
Link: https://doi.org/10.1515/..

Exemplare:  TB BHV: com 764/99(10); TB Nautik Acc Eck.1
 
?
11

Designing for privacy and its legal framework 

data protection by design and default for the internet of t...  Law, governance and technology series ; volume 40;ProQuest Ebook Central
Link: http://ebookcentral.proq..

Exemplar:  BB Nat.-NW1: h jur 103.2 ea/101
 
?
13

Data analytics and decision support for cybersecurity 

trends, methodologies and applications  Data analytics;Data Analytics Ser.
 
?
 
?
15

Cybersecurity for industry 4.0 

analysis for design and manufacturing  Springer series in advanced manufacturing;Springer Series in Advanced Manufacturing Ser.
 
1-15