Refine your search
Availability
-
Authors
- Almalawi, Abdulmohse...
- Cerra, Allison
- Cheng, Peng, Zhang, ...
- Couretas, Jerry M.
- Erickson, Jon
- Issac, Biju
- Jakobsen, Adam Tilma...
- Katz, Jonathan
- Mammeri, Zoubir Z.
- Morana, Marco M.
- Moschovitis, Christo...
- Quade, Phil [Ed.]
- Rébé, Nathalie [Ed.]
- Sheikh, Farhana
- Sousa, Leonel A.
- Stallings, William
- Stiennon, Richard
- Tari, Zahir
- Uceda Vélez, Tony
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Series
-
Topics
- Business enterprises
- Components, Circuits...
- Computer crimes
- Computer networks
- Computer security
- Computer Security
- Cyber intelligence (...
- Cyberinfrastructure
- Data encryption (Com...
- Data protection
- Database Security
- Information security
- Integrated curcuits
- Intrusion detection ...
- Machine learning
- Management informati...
- POLITICAL SCIENCE / ...
- Risk assessment
- Wiley Data and Cyber...
- Show more
- Show less