-
1
Pro Spring security securing Spring Framework 5 and Boot 2-based Java applications /
“…SpringerLink (Online service)…”
Get full text
Online Book -
2
Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings /
“…SpringerLink (Online service)…”
Get full text
Online Book -
3
The NICE cyber security framework : cyber security intelligence and analytics /
“…SpringerLink (Online service)…”
Get full text
Online Book -
4
Artificial intelligence and security : 5th international conference, icais 2019, new york, ny, usa, july 26-28, 2019, proceedings, part ii /
“…SpringerLink (Online service)…”
Get full text
Get full text
Online Book -
5
Artificial intelligence and security 5th international conference, icais 2019, new york, ny, usa, july 26-28, 2019, proceedings, part iii /
“…SpringerLink (Online service)…”
Get full text
Online Book -
6
Practical cyber forensics an incident-based approach to forensic investigations /
“…SpringerLink (Online service)…”
Get full text
Online Book -
7
Pro azure governance and security : a comprehensive guide to azure policy, blueprints, security center, and sentinel /
“…SpringerLink (Online service)…”
Get full text
Online Book -
8
Security and privacy trends in the industrial internet of things /
“…SpringerLink (Online service)…”
Get full text
Online Book -
9
Security, Privacy and Trust in the IoT Environment /
“…SpringerLink (Online service)…”
Get full text
Online Book -
10
Karma-Based API on Apple Platforms : Building Privacy into IOS and MacOS Apps /
“…SpringerLink (Online service)…”
Get full text
Online Book -
11
Beginning security with Microsoft technologies protecting Office 365, devices, and data /
“…SpringerLink (Online service)…”
Get full text
Online Book -
12
Blockchain and clinical trial : securing patient data /
“…SpringerLink (Online service)…”
Get full text
Online Book -
13
Cyber operations : building, defending, and attacking modern computer networks /
“…SpringerLink (Online service)…”
Get full text
Online Book -
14
-
15
Machine learning for cyber agents : attack and defence /
“…SpringerLink (Online service)…”
Get full text
Online Book -
16
Location privacy protection in mobile networks /
“…SpringerLink (Online service)…”
Get full text
Online Book -
17
Detecting peripheral-based attacks on the host memory /
“…SpringerLink (Online service)…”
Get full text
Online Book -
18
Illumination of artificial intelligence in cybersecurity and forensics /
“…SpringerLink (Online service)…”
Get full text
Online Book -
19
Access control management in cloud environments /
“…SpringerLink (Online service)…”
Get full text
Online Book -
20
Digital transformation, cyber security and resilience of modern societies /
“…SpringerLink (Online service)…”
Get full text
Online Book