Search

Your search keyword '"Martin, C."' showing total 175 results

Search Constraints

Start Over You searched for: "Martin, C." Remove constraint "Martin, C." Category computers / security / general Remove constraint Category: computers / security / general
175 results on '"Martin, C."'

Search Results

1. Getting to Yes with China in Cyberspace

2. Internet Freedom Software and Illicit Activity : Supporting Human Rights Without Enabling Criminals

3. Crisis and Escalation in Cyberspace

4. Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents

5. Trusted Execution Environments

6. Blockchain and IoT Approaches for Secure Electronic Health Records (EHR)

7. Navigating Cyber Threats and Cybersecurity in the Logistics Industry

8. Strengthening Industrial Cybersecurity to Protect Business Intelligence

9. Enhancing Performance, Efficiency, and Security Through Complex Systems Control

10. Proceedings of Data Analytics and Management : ICDAM 2023, Volume 1

11. The Adoption of Fintech : Using Technology for Better Security, Speed, and Customer Experience in Finance

12. Building Cybersecurity Applications with Blockchain and Smart Contracts

13. The Business of Cyber : Why You Should Question What Your Security Team Are Telling You

14. Managing Internet of Things Applications Across Edge and Cloud Data Centres

15. Improving Security, Privacy, and Connectivity Among Telemedicine Platforms

16. Principles of Cybersecurity

17. Computing and Informatics : 9th International Conference, ICOCI 2023, Kuala Lumpur, Malaysia, September 13–14, 2023, Revised Selected Papers, Part I

18. System Reliability and Security : Techniques and Methodologies

19. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses

20. Supporting Technologies and the Impact of Blockchain on Organizations and Society

21. Building Secure Business Models Through Blockchain Technology : Tactics, Methods, Limitations, and Performance

22. Towards New E-Infrastructure and E-Services for Developing Countries : 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings

23. What Is Cybersecurity For?

24. Soft Computing for Security Applications : Proceedings of ICSCS 2023

25. Ubiquitous Security : Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

26. The Handbook of Homeland Security

27. Risks and Security of Internet and Systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers

29. Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies

30. Cloud Computing Security : Foundations and Research Directions

31. Convergence of Internet of Things and Blockchain Technologies

32. The Complete Guide to SCION : From Design Principles to Formal Verification

33. Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers

34. Deep Learning for Security and Privacy Preservation in IoT

35. Cyber Security : Critical Infrastructure Protection

36. Internet of Things : Security and Privacy in Cyberspace

37. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

38. Applications of Blockchain and Big IoT Systems : Digital Solutions for Diverse Industries

39. Cyberwarfare : Threats to Critical Infrastructure

40. Research Anthology on Securing Medical Systems and Records

41. Explainable Artificial Intelligence for Cyber Security : Next Generation Artificial Intelligence

42. Research Anthology on Convergence of Blockchain, Internet of Things, and Security

43. Recent Innovations in Computing : Proceedings of ICRIC 2021, Volume 2

44. Machine Learning and Intelligent Communications : 5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020, Proceedings

45. Cross-Cultural Design. Experience and Product Design Across Cultures : 13th International Conference, CCD 2021, Held As Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part I

46. A Vulnerable System : The History of Information Security in the Computer Age

47. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

48. Quality, Reliability, Security and Robustness in Heterogeneous Systems : 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings

49. Proceedings of International Conference on Computational Intelligence and Computing : ICCIC 2020

50. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector

Catalog

Books, media, physical & digital resources