مرور بر اساس تاریخ انتشار Security. ;

Showing results 1 to 20 of 26  بعدی >
PreviewIssue DateTitleContributor(s)
9789811090493.pdf.jpg2018Advanced Monitoring in P2P BotnetsKaruppayah, Shankar. ;
9781484236260.pdf.jpg2018Asset Attack VectorsHaber, Morey J. ;; Hibbert, Brad. ;
9783319790350.pdf.jpg2018Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian FederationPetrenko, Sergei. ;
9783319739519.pdf.jpg2018Cyber Threat IntelligenceDehghantanha, Ali. ;; Conti, Mauro. ;; Dargahi, Tooska. ;
9781484236994.pdf.jpg2018Defending IoT Infrastructures with the Raspberry PiHosmer, Chet. ;
9781484227992.pdf.jpg2017Digital Privacy and Security Using WindowsHassan, Nihad A. ;; Hijazi, Rami. ;
9781484232583.pdf.jpg2018Enterprise Cybersecurity Study GuideDonaldson, Scott E. ; author. ;; Siegel, Stanley G. ; author. ;; Williams, Chris K. ; author. ;; Aslam, Abdul. ; author. ;
9783319756509.pdf.jpg2018Foundations and Practice of SecurityImine, Abdessamad. ; editor. ;; Fernandez, Jose M. ; editor. ;; Marion, Jean-Yves. ; editor. ;; Logrippo, Luigi. ; editor. ;; Garcia-Alfaro, Joaquin. ; editor. ;
9789811077388.pdf.jpg2018Honeypot Frameworks and Their Applications: A New FrameworkNG, Chee Keong. ;; Pan, Lei. ;; Xiang, Yang. ;
9789811077395.pdf.jpg2018Honeypot Frameworks and Their Applications: A New FrameworkNG, Chee Keong. ;; Pan, Lei. ;; Xiang, Yang. ;
9783319770284.pdf.jpg2018Information Technology - New GenerationsLatifi, Shahram. ;
9783319930480.pdf.jpg2018Introduction to Security ReductionGuo, Fuchun. ;; Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;; Mu, Yi. ;
9789811300226.pdf.jpg2018Mathematics and ComputingGhosh, Debdas. ;; Giri, Debasis; Mohapatra, Ram N. ;; Savas, Ekrem. ;; Sakurai, Kouichi. ;; Singh, L. P. ;
9789811300233.pdf.jpg2018Mathematics and ComputingGhosh, Debdas. ;; Giri, Debasis; Mohapatra, Ram N. ;; Savas, Ekrem. ;; Sakurai, Kouichi. ;; Singh, L. P. ;
9789811046421.pdf.jpg2017Mathematics and ComputingGiri, Debasis; Mohapatra, Ram N. ;; Begehr, Heinrich. ;; Obaidat, Mohammad S. ;
9781484232125.pdf.jpg2018Open Source Intelligence Methods and ToolsHassan, Nihad A. ;; Hijazi, Rami. ;
9781484237564.pdf.jpg2018Pro iOS Security and ForensicsButow, Eric. ;
9783319788135.pdf.jpg2018Security and Privacy in Communication NetworksLin, Xiaodong. ;; Ghorbani, Ali. ;; Ren, Kui. ;; Zhu, Sencun. ;; Zhang, Aiqing. ;
9783319788166.pdf.jpg2018Security and Privacy in Communication NetworksLin, Xiaodong. ;; Ghorbani, Ali. ;; Ren, Kui. ;; Zhu, Sencun. ;; Zhang, Aiqing. ;
9783319596082.pdf.jpg2017Security and Privacy in Communication NetworksDeng, Robert H. ;; Weng, Jian. ;; Ren, Kui. ;; Yegneswaran, Vinod. ;