„security cloud computing.“
Suchergebnisse
711 Treffer
-
Graphical Models for Security – Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
-
Cloud Computing and Security – First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
-
Advanced Multimedia and Ubiquitous Engineering – MUE/FutureTech 2017
-
Joint Security Management: organisationsübergreifend handeln – Mehr Sicherheit im Zeitalter von Cloud-Computing, IT-Dienstleistungen und industrialisierter IT-Produktion
-
Advanced Computing and Systems for Security – Volume Eight
-
Der Cyber Survival Guide – So wehren Sie sich erfolgreich gegen Hacker, Stalker und andere Cyber-Gangster
-
Der Cyber Survival Guide – So wehren Sie sich erfolgreich gegen Hacker, Stalker und andere Cyber-Gangster
-
Cloud Computing and Security – Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I
-
Privacy and Identity Management. Time for a Revolution? – 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers
-
The Semantic Web. Latest Advances and New Domains – 13th International Conference, ESWC 2016, Heraklion, Crete, Greece, May 29 -- June 2, 2016, Proceedings
-
Management and Security in the Age of Hyperconnectivity – 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings
-
Cloud Computing and Security – Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II
-
Cyber Security. Simply. Make it Happen. – Leveraging Digitization Through IT Security
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX – Special Issue on Cloud Computing
-
Security Einfach Machen – IT-Sicherheit als Sprungbrett für die Digitalisierung
-
Research Advances in Cloud Computing
-
Towards a service-based internet – third European conference ; proceedings
-
Microsoft 365 absichern – Der Security-Guide für Ihren Tenant
-
Blockchain Technology – Einführung für Business- und IT Manager
-
Cloud Security – Techniques and Applications