Erscheinungsjahr
Format
Lizenz
TIB-Lesesaalbestand
-
Secrets of a cyber security architect
TIBKAT | 2020|Schlagwörter: Computer security, Computer networks, Computer networks ; Security measures -
Cyber strategy : risk-driven security and resiliency
TIBKAT | 2020|Schlagwörter: COMPUTERS / Security / General, COMPUTERS / Internet / Security, Computer security, Computer networks, Computer networks ; Security measures -
Estimating the Contextual Risk of Data Breach: An Empirical Approach
Taylor & Francis Verlag | 2015|Schlagwörter: computer crime, computer security, information security, IT security risks -
Cyber breach response that actually works : organizational approach to managing residual risk
TIBKAT | 2020|Schlagwörter: Computer security ; Management, Computer security -
From information security to cyber security
Elsevier | 2013|Schlagwörter: Information security, Cyber security, Cyber-Security, Computer security -
Authentication and Access Control : Practical Cryptography Methods and Tools
TIBKAT | 2021|Schlagwörter: Computer security. -
Hands on hacking
TIBKAT | 2020|Schlagwörter: Computer security, COMPUTERS / Security / Network Security -
Countering code injection attacks: a unified approach
Emerald Group Publishing | 2011|Schlagwörter: Data security, Computer crime, Information security, Computer security, Internet security, Security -
Effective cybersecurity : understanding and using standards and best practices
TIBKAT | 2019|Schlagwörter: COMPUTERS / Security / General, Computer security, Internet ; Security measures, Computer networks, Computer networks ; Security measures, Computer security ; Standards -
Cyber security of industrial control systems in the future internet environment
TIBKAT | 2020|Schlagwörter: Process control ; Security measures, Computer security -
Establishing cyber security programs through the community cyber security maturity model (CCSMM)
TIBKAT | 2020|Schlagwörter: Computer security, Computer networks, Community information services ; Security measures, Computer networks ; Security measures -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Schlagwörter: Database security, Computer security -
The penetration tester's guide to web applications
TIBKAT | 2019|Schlagwörter: Penetration testing (Computer security), Computer security -
Zero Trust Security : An Enterprise Guide
TIBKAT | 2021|Schlagwörter: Computer security., Computer science. -
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
Springer Verlag | 2018|Schlagwörter: Computer Science, Security, Computer Communication Networks, Systems and Data Security -
Vulnerability analysis on the image‐based authentication: Through the WM_INPUT message
Wiley | 2020|Schlagwörter: information security, computer hacking, computer crime, computer security -
Cybersecurity blue team toolkit
TIBKAT | 2019|Schlagwörter: Computer security, COMPUTERS ; Security ; General
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.