11. Sicherheitskonzepte in der mobilen Kommunikation : Drahtlose Kommunikation -- Protokolle und Gefahren /: Drahtlose Kommunikation -- Protokolle und Gefahren. (2018) Authors: Osterhage, Wolfgang Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. Network and data security for non-engineers. ([2017]) Authors: Groom, Frank M; Groom, Kevin M; Jones, Stephan Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. E-Health : Datenschutz und Datensicherheit : Herausforderungen und Lösungen im IoT-Zeitalter /: Datenschutz und Datensicherheit : Herausforderungen und Lösungen im IoT-Zeitalter. ([2018]) Authors: Bauer, Christoph; Eickmeier, Frank; Eckard, Michael Editors: Kafke, Kerstin; Klette, Daniela; Schwaner, Astrid Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Trusted Web 4.0 - Konzepte einer digitalen Gesellschaft : Konzepte der Dezentralisierung und Anonymisierung /: Konzepte der Dezentralisierung und Anonymisierung. ([2016]) Authors: Berberich, Olaf Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics /: infrastructure security with Red Team and Blue Team tactics. (2018) Authors: Diogenes, Yuri; Ozkaya, Erdal Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
16. Digital resilience : is your company ready for the next cyber threat? /: is your company ready for the next cyber threat?. ([2018]) Authors: Rothrock, Ray A Other Names: Clarke, Richard A writer of foreword. Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
17. We are Anonymous : inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency /: inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. (2013) Authors: Olson, Parmy Record Type: Book Extent: 1 online resource (528 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
18. International Joint Conference : 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019) : Seville, Spain, May 13th-15th, 2019 : proceedings /: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019) : Seville, Spain, May 13th-15th, 2019 : proceedings. ([2019]) Editors: Martínez Alvarez, Francisco; Lora, Alicia Troncoso; Muñoz, José António Sáez; Quintián, Héctor; Corchado, Emilio Other Names: International Conference on Computational Intelligence in Security for Information Systems, 12th; International Conference on EUropean Transnational Education, 10th Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
19. Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks /: identify and safeguard your network against both internal and external threats, hackers, and malware attacks. (2016) Authors: Datt, Samir Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗