Lignende værker: Foundations of Security Analysis and Design VII :
- Theory of Cryptography : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : Proceedings /
- Cryptographic Hardware and Embedded Systems, CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014 : Proceedings /
- Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014 : Proceedings /
- Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014 : Proceedings /
- Cryptography and Security Systems : Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : Proceedings /
- Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : Proceedings /
Emne: Protección de Datos
- Internet security for business /
- The End of Privacy : How Total Surveillance is Becoming a Reality /
- Cyberethics : Morality and Law in Cyberspace /
- Técnicas criptográficas de protección de datos /
- Network and Internetworking Security : Principles and Practice /
- Cryptography and Network Security : Principles and Practice/
Emne: Computación en la Nube
- Artificial Intelligence : 30th Benelux, BNAIC 2018, 's-Hertogenbosch, Holanda, The Netherlands, November 8-9, 2018 : Revised Selected Papers /
- Propuestas didácticas para el aprendizaje en tecnología e informática /
- Grid and Pervasive Computing : 8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013 : Proceedings /
- Advanced Computing, Networking and Security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011 : Revised Selected Papers /
- Advanced Methods, Techniques, and Applications in Modeling and Simulation : Asia Simulation Conference 2011, Seoul, Korea, November 2011 : Proceedings /
- AI-Powered IoT for COVID-19 /