Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 5
- Computer networks 3
- Security measures 3
- Data protection 2
- Handbooks, manuals, etc 2
- Management 2
- Prevention 2
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Cyberterrorism 1
- Information technology 1
- Internal security 1
- Mobile communication systems 1
- Mobile computing 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Technology 1
- Violence 1
- computer security 1
-
1
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
2
IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES
Published 2017-12-01Subjects: “…computer security…”
Get full text
Article -
3
Applied network security monitoring : collection, detection, and analysis /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
4
-
5
-
6
Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors
Published 2025-08-01Subjects: Get full text
Article -
7
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
8
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Published 2025-01-01Subjects: “…Computer security…”
Get full text
Article -
9
Application of interactive effect evaluation model in improving computer security management and teaching management
Published 2025-02-01Subjects: Get full text
Article -
10
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
11
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: “…date and computer security…”
Get full text
Article -
12
Reflections on Informatic Crime in the Republic of Moldova
Published 2025-03-01Subjects: Get full text
Article -
13
Membership Inference Attacks and Differential Privacy: A Study Within the Context of Generative Models
Published 2025-01-01Subjects: Get full text
Article -
14
Cybersecurity Transformation: Cyber-Resilient IT Project Management Framework
Published 2024-10-01Subjects: Get full text
Article -
15
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
16
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
17
Computer security lab manual /
Subjects: “…Computer security Management Handbooks, manuals, etc. 10577…”
Table of contents only
Contributor biographical information
View in OPAC
Book -
18
Malware in Computer Systems: Problems and Solutions
Published 2020-11-01Subjects: Get full text
Article -
19
HORIZONTE DE LA SEGURIDAD INFORMÁTICA EN LA ERA DE LA INDUSTRIA 4.0
Published 2020-07-01Subjects: “…cognitive computing and computer security…”
Get full text
Article -
20
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article