Showing 1 - 20
of 26
for search: '',
query time: 0.07s
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.Narrow Search
Institution
Collection
Format
Subject
Computer crimes
22
Computer security
6
Computer networks Security measures
4
Artificial intelligence
2
Computational intelligence
2
Computer networks
more ...
2
Computer science
2
Computer security Government policy
2
Computers
2
Data encryption (Computer science)
2
Hackers
2
Machine learning
1
Acquisition of computer software
1
Application software
1
Big data
1
Computer crimes Prevention
1
Computer organization
1
Computer security Graphic methods
1
Computer security Management
1
Computer security Study and teaching Simulation methods
1
Computer viruses
1
Computers Law and legislation
1
Criminology
1
Cryptography
1
Cyber intelligence (Computer security)
1
Cyberspace operations (Military science)
1
Cyberterrorism Government policy
1
Cyberterrorism Prevention
1
Data protection
1
Data protection Law and legislation
see all ...
less ...
Author
12
SpringerLink (Online service)
4
SpringerLink (Online Service)
3
EBSCOhost
2
Abawajy, Jemal H., 1982-
2
Choo, Kim-Kwang Raymond,
2
International Conference on Applications and Techniques in Cyber Security and Intelligence
more ...
2
Maleh, Yassine, 1987-
2
ScienceDirect (Online service)
1
Abd El-Latif, Ahmed A., 1984-
1
Ahmadzadeh, Ali
1
Alazab, Mamoun, 1980-
1
Alkanhal, Mohamed I.,
1
Atiquzzaman, Mohammed,
1
Baddi, Youssef,
1
Bearden, Tom
1
Bidwell, Teri
1
Biggs, John, 1975-
1
Burnett, Mark
1
Case, Andrew (Digital forensics researcher),
1
Ciptadi, Arridhana
1
Computer Emergency Response Team
1
Corradini, Isabella,
1
Craig, Paul
1
Cross, Michael, 1965-
1
Eades, Harley, III
1
Ebooks Corporation
1
El-Affendi, Mohammed, 1971-
1
European Symposium on Research in Computer Security
1
Films for the Humanities & Sciences (Firm)
1
Gadyatskaya, Olga
see all ...
less ...
Language
Genre
Literary Form
Region
Call Number
Year of Publication