„data security“
Suchergebnisse
6.107 Treffer
-
Industrial Control System (ICS) and Operational Technology (OT) Security – An Introduction to Securing a Complex Industrial Environment
-
Quantum Protocols in Blockchain Security
-
IAM and PAM Cybersecurity – Securing Identities and Access Management in the Digitalization Era
-
Using digitally mediated methods in sensitive contexts: a threat analysis and critical reflection on data security, privacy, and ethical concerns in the case of Afghanistan
-
Blockchain Without Barriers – An Authentic Guide to Blockchain Interoperability
-
CompTIA Security+ (SY0-701) Certification Companion – Hands-on Preparation and Practice Guide
-
Dataveillance and the State. Surveillance, Privacy, and Digital Governance in the Age of Big Data
-
Pro Azure Governance and Security – A Comprehensive Guide to Safeguarding Your Cloud Computing
-
Security, Privacy and Data Analytics – Select Proceedings of the 3rd International Conference, ISPDA 2024
-
Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track and Demo Track – European Conference, ECML PKDD 2025, Porto, Portugal, September 15–19, 2025, Proceedings, Part X
-
Information Security and Privacy – 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III
-
Applied Cryptography and Network Security Workshops – ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23–26, 2025, Revised Selected Papers, Part I
-
Human Aspects of Information Security and Assurance – 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings
-
Erratum to: Security assessment framework for IoT service
-
Economics of Information Security and Privacy
-
Rückzug des Staats? – Das Spannungsfeld zwischen staatlicher und privater Sicherheit
-
Bewertung und Mitigation von Cybersicherheitsrisiken bei Photovoltaik-Systemen
-
Navigating the NLP and text-based conversational AI: a survey for problem formulation in Amharic texts
-
Computational Engineering Approach-Based Modeling of Safety and Security Boundaries: A Review, Novel Model, and Comparison
-
Boosting security and resilience in digital color image zero watermarking with the Gannet Aquila-Inspired ghost mob_net technique