61. Hands-On Bitcoin Programming with Python : Build powerful online payment centric applications with Python /: Build powerful online payment centric applications with Python. (2018) Authors: Garg, Harish Kumar Record Type: Book Extent: 1 online resource (90 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
62. Secure compressive sensing in multimedia data, cloud computing and IoT. ([2019]) Authors: Zhang, Yushu; Xiang, Yong; Zhang, Leo Yu Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
63. Datenschutz : Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie /: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie. (2017) Authors: Petrlic, Ronald; Sorge, Christoph Record Type: Book Extent: 1 online resource (178 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
64. Jenkins Fundamentals : Accelerate deliverables, manage builds, and automate pipelines with Jenkins /: Accelerate deliverables, manage builds, and automate pipelines with Jenkins. (2018) Authors: Muli, Joseph; Okoth, Arnold Record Type: Book Extent: 1 online resource (234 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
65. Critical information infrastructures security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers /: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers. (2018) Editors: D'Agostino, Gregorio; Scala, Antonio, 1968- Other Names: CRITIS (Workshop), 12th Record Type: Book Extent: 1 online resource (xi, 272 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
66. Cloud computing and security. 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised selected papers /: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised selected papers. Part IV : (2018) Editors: Sun, Xingming; Pan, Zhaoqing; Bertino, Elisa Other Names: ICCCS (Conference), 4th Record Type: Book Extent: 1 online resource (xvii, 721 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
67. Applications and techniques in information security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings /: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings. (2017) Editors: Batten, Lynn Margaret; Kim, Dong Seong; Zhang, Xuyun; (Computer scientist), Li, Gang Other Names: ATIS (Conference), 8th Record Type: Book Extent: 1 online resource (xiv, 223 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
68. Cryptology and network security : 17th International Conference, CANS 2018, Naples, Italy, September 30-October 3, 2018, Proceedings /: 17th International Conference, CANS 2018, Naples, Italy, September 30-October 3, 2018, Proceedings. (2018) Editors: Camenisch, Jan; Papadimitratos, Panos Other Names: International Conference on Cryptology and Network Security, 17th Record Type: Book Extent: 1 online resource (xiii, 518 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
69. Ethical and social issues in the information age. (2017) Authors: Kizza, Joseph Migga Record Type: Book Extent: 1 online resource (xxii, 413 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
70. Advances in cryptology -- ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings /: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Part I : (2017) Editors: (Mathematician), Takagi, Tsuyoshi; Peyrin, Thomas Other Names: International Conference on the Theory and Application of Cryptology and Information Security, 23rd Record Type: Book Extent: 1 online resource (xxvi, 813 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗