1201. HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings /: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings. (2020) Editors: Moallem, Abbas Record Type: Book Extent: 1 online resource (684 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1202. Mastering Windows Security and Hardening : Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats /: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats. (2020) Authors: Dunkerley, Mark; Tumbarello, Matt Record Type: Book Extent: 1 online resource (572 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1203. E-Business and Telecommunications : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers /: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers. (2020) Editors: Obaidat, Mohammad S Record Type: Book Extent: 1 online resource (277 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1204. SQL injection strategies : practical techniques to secure old vulnerabilities against modern attacks /: practical techniques to secure old vulnerabilities against modern attacks. (2020) Authors: Galluccio, Ettore; Caselli, Edoardo; Lombari, Gabriele Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1205. Financial cryptography and data security 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers /: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers. (2020) Other Names: Bonneau, Joseph; Heninger, Nadia Anne, 1982-; FC (Conference), 24th Record Type: Book Extent: 1 online resource (689 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1206. Blockchain for cybersecurity and privacy : architectures, challenges, and applications /: architectures, challenges, and applications. (2020) Editors: Maleh, Yassine, 1987-; Shojafar, Mohammad; Alazab, Mamoun; Romdhani, Imed Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1207. Advanced Computing and Systems for Security : Volume Eleven /: Volume Eleven. (2020) Editors: Chaki, Rituparna; Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu Record Type: Book Extent: 1 online resource (143 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1208. Crime dot com : from viruses to vote rigging, how hacking went global /: from viruses to vote rigging, how hacking went global. (2020) Authors: White, Geoff Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1209. China internet development report 2018 : Blue Book of World Internet Conference /: Blue Book of World Internet Conference. (2020) Other Names: Ping, Peng translator.; Chinese Academy of Cyberspace Studies.; World Internet Conference Record Type: Book Extent: 1 online resource (151 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1210. Social Network Analysis and Law Enforcement : Applications for Intelligence Analysis /: Applications for Intelligence Analysis. (2020) Authors: Burcher, Morgan Record Type: Book Extent: 1 online resource (195 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗