Refine your search
Availability
-
Authors
- Almalawi, Abdulmohse...
- Bhatt, Chintan M.
- Cerra, Allison
- Chatzimisios, Perikl...
- Chen, Lei
- Cheng, Peng, Zhang, ...
- Hosmer, Chet
- Issac, Biju
- Khoury, Franjieh El
- Le, Dac-Nhuong
- Le-Khac, Nhien-An
- Liyanage, Madhusanka
- Madhukar, Mani
- Morana, Marco M.
- Moschovitis, Christo...
- Stallings, William
- Takabi, Hassan
- Uceda Vélez, Tony
- Wang, Chin-Liang
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Series
-
Topics
- Business enterprises
- Cloud computing
- Computer networks
- Computer networks--S...
- Computer security
- Cyber intelligence (...
- Cyberinfrastructure
- Cyberterrorism
- Data encryption (Com...
- Data protection
- Internet of things
- Intrusion detection ...
- Management informati...
- Peer-to-peer archite...
- POLITICAL SCIENCE / ...
- Python (Computer pro...
- Risk assessment
- Social media
- Telecommunication sy...
- Show more
- Show less