11. Cyber Security Skills and the UK's Critical National Infrastructure : Second Report of Session 2017-19.: Second Report of Session 2017-19. Oral and written evidence / Volume 2, ([2018-07-19]) Other Names: Great Britain., Parliament., Joint Committee on National Security Strategy. Record Type: Book Extent: 1 online resource (303 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. Recent trends and future technology in applied intelligence : 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings /: 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings. ([2018]) Editors: Mouhoub, Malek; Sadaoui, Samira; Ait Mohamed, Otmane; Ali, Moonis Other Names: International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, 31st Record Type: Book Extent: 1 online resource (xx, 913 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. Smart micro-grid systems security and privacy. (2018) Editors: Kayem, Anne V. D. M (Anne Voluntas dei Massah); Wolthusen, Stephen D; Meinel, Christoph, 1954- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Smart cities of today and tomorrow : better technology, infrastructure and security /: better technology, infrastructure and security. (2018) Authors: Pelton, Joseph N; Singh, Indu Bhushan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. Emerging technologies in data mining and Information security. proceedings of IEMIS 2018 /: proceedings of IEMIS 2018. Volume 2 : ([2019]) Editors: Abraham, Ajith, 1968-; Dutta, Paramartha; Mandal, Jyotsna Kumar, 1960-; Bhattacharya, Abhishek; Dutta, Soumi Other Names: International Conference on Emerging Technologies in Data Mining and Information Security Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
16. Emerging technologies in data mining and information security. proceedings of IEMIS 2018 /: proceedings of IEMIS 2018. Volume 3 : ([2019]) Editors: Abraham, Ajith, 1968-; Dutta, Paramartha; Mandal, Jyotsna Kumar, 1960-; Bhattacharya, Abhishek; Dutta, Soumi Other Names: International Conference on Emerging Technologies in Data Mining and Information Security Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
17. ICT systems security and privacy protection : 33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, proceedings /: 33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, proceedings. (2018) Editors: Janczewski, Lech, 1943-; Kutyłowski, Mirosław Other Names: IFIP TC11 International Information Security Conference, 33rd; IFIP World Computer Congress, 24th Record Type: Book Extent: 1 online resource (xiii, 400 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
18. Research and practical issues of enterprise information systems : 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Proceedings /: 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Proceedings. (2018) Editors: Tjoa, A Min; Raffai, Maria; Doucek, P (Petr); Novak, Niina Maarit Other Names: CONFENIS (Conference), 12th; IFIP World Computer Congress, 24th Record Type: Book Extent: 1 online resource (x, 161 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
19. Advances in cryptology -- ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings /: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Part III : (2017) Editors: (Mathematician), Takagi, Tsuyoshi; Peyrin, Thomas Other Names: International Conference on the Theory and Application of Cryptology and Information Security, 23rd Record Type: Book Extent: 1 online resource (xviii, 473 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
20. Hands-on red team tactics : a practical guide to mastering red team operations /: a practical guide to mastering red team operations. (2018) Authors: Sharma, Himanshu; Singh, Harpreet Record Type: Book Extent: 1 online resource (469 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗