Refine your search
Availability
-
Authors
- Abbas Moallem
- Adkins, Heather
- Alex X. Liu, Rui Li
- Beyer, Betsy
- Blankinship, Paul
- Blum, Dan
- Calles, Miguel A.
- Chio, Clarence
- Debin Gao, Qi Li, Xi...
- Diogenes, Yuri
- edited by Abbas, Ali...
- Freeman, David
- Haber, Morey J.
- Hayden, Lance
- K.A. Monappa
- Lakshmi, Vasantha
- Layton, Timothy P.
- Lewandowski, Piotr
- Mikael Asplund, Simi...
- Oprea, Ana
- Orr Dunkelman, Micha...
- Ozkaya, Erdal
- P R, Biju
- Rolls, Darran
- Stapleton, J. J.
- Syubblefield, Adam
- Tambe, Milind
- Vacca, John R.
- Von Winterfeldt, Det...
- Yao, Jiewen
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Topics
- Business --Data proc...
- Business enterprises...
- Business enterprises...
- Civil defense
- Computer crimes
- Computer crimes --Pr...
- Computer firmware --...
- Computer networks
- Computer networks--S...
- Computer science
- Computer security
- Computer security --...
- Computer security--C...
- Computer security--M...
- Computer security. ᅠ
- Computer software
- Computer software--E...
- Confidential busines...
- Data protection
- Data protection --Ev...
- Data protection--Sta...
- Data protection-Law ...
- Data protection. App...
- Data protection. Com...
- Data protection. ᅠ
- Data structures (Com...
- Identity theft
- Information storage ...
- Information technolo...
- Information technolo...
- Information technolo...
- Internal security
- Internet--Safety mea...
- Internet--Security m...
- Machine learning
- Malware (Computer so...
- Microsoft Office
- Microsoft software
- Microsoft Windows (C...
- National security
- Risk assessment. ᅠ
- Security measures
- Security systems
- Software engineering
- United States
- User interfaces (Com...
- Show more
- Show less