1161. Combating security challenges in the age of big data : powered by state-of-the-art artificial intelligence techniques /: powered by state-of-the-art artificial intelligence techniques. (2020) Other Names: Fadlullah, Zubair; Khan Pathan, Al-Sakib Record Type: Book Extent: 1 online resource (271 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1162. Cyber defence in the age of AI, smart societies and augmented humanity. (2020) Editors: Jahankhani, Hamid; Kendzierskyj, Stefan; Chelvachandran, Nishan; Ibarra, Jaime Record Type: Book Extent: 1 online resource (viii, 450 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1163. The security of critical infrastructures risk, resilience and defense /: risk, resilience and defense. (2020) Other Names: Keupp, Marcus Matthias, 1977- Record Type: Book Extent: 1 online resource (212 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1164. Differential Privacy for Dynamic Data. (2020) Authors: Le Ny, Jérôme Record Type: Book Extent: 1 online resource (110 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1165. Information security and cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers /: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. (2020) Other Names: Liu, Zhe; Yung, Moti; Inscrypt (Conference), 15th Record Type: Book Extent: 1 online resource (560 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1166. Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology /: how to bridge the gap between people and digital technology. (2020) Other Names: Corradini, Isabella Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1167. Computer and network security. (2020) Editors: Sen, Jaydip Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1168. Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part I (2020) Other Names: Canteaut, Anne; Ishai, Yuval; EUROCRYPT (Conference), 39th Record Type: Book Extent: 1 online resource (805 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1169. Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part III (2020) Other Names: Canteaut, Anne; Ishai, Yuval; EUROCRYPT (Conference), 39th Record Type: Book Extent: 1 online resource (823 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1170. Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part II (2020) Other Names: Kiayias, Aggelos; Kohlweiss, Markuff; Wallden, Petros; Zikas, Vassilis; International Workshop on Practice and Theory in Public Key Cryptography, 23rd Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗