-
1Book
Authors: Tapaninen, Ulla, Hilmola, Olli-Pekka
Subject Terms: COVID-19 Pandemic,Supply Chain Management,UNSDGs,Cybersecurity,Big Data,Blockchain, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDH E-book readers, tablets and other portable devices: consumer / user guides, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TD Industrial chemistry and manufacturing technologies
File Description: image/jpeg; application/pdf
-
2Book
Source: SpringerBriefs in Computer Science ISBN: 9783031805035
Subject Terms: safety-critical systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, safety documents, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPQ Decision theory: general::GPQD Risk assessment, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, functional safety, thema EDItEUR::U Computing and Information Technology::UK Computer hardware, software verification and validation, risk management, software safety
File Description: image/jpeg; application/pdf
-
3Book
Authors: Krasnobayev, Victor, Yanko, Alina, Hlushko, Alina, Kruk, Oleg, Kruk, Oleksandr, Gakh, Vitalii, Onyshchenko, Svitlana, Maslii, Oleksandra, Kivshyk, Oleksandr, Potapova, Kateryna, Nalyvaichuk, Mykola, Meliukh, Vasyl, Gurynenko, Stanislav, Koliada, Kostiantyn, Scherbyna, Alexandre, Poltorak, Anastasiia, Tyshchenko, Svitlana, Khrystenko, Olha, Ribachuk, Volodimir, Kuzoma, Vitalii, Stamat, Viktoriia, Kolesnyk, Maksym, Arefieva, Olena, Onopriienko, Dmytro, Kovalenko, Yuliia, Ostapenko, Tetiana, Hrashchenko, Iryna
Subject Terms: economic cyber security, national economy, state regulatory policy, semantic role labeling, thema EDItEUR::U Computing and Information Technology::UR Computer security, circular economy, strategically important enterprises, modular number system, thema EDItEUR::K Economics, Finance, Business and Management, non-positional number system, Integer economic data processing systems, intrusion detection systems, institutional support, natural language processing, national security, monitoring financial security, unauthorized access
File Description: image/jpeg
-
4Book
Authors: Serhii Yevseiev, Yuliia Khokhlachova, Serhii Ostapov, Oleksandr Laptiev, Olha Korol, Stanislav Milevskyi, Oleksandr Milov, Serhii Pohasii, Yevgen Melenti, Vitalii Hrebeniuk, Alla Havrylova, Serhii Herasуmov, Roman Korolev, Oleg Barabash, Valentyn Sobchuk, Roman Kyrychok, German Shuklin, Volodymyr Akhramovych, Vitalii Savchenko, Sergii Golovashych, Oleksandr Lezik, Ivan Opirskyy, Oleksandr Voitko, Kseniia Yerhidzei, Serhii Mykus, Yurii Pribyliev, Oleksandr Prokopenko, Andrii Vlasov, Nataliia Dzheniuk, Maksym Tolkachov
Contributors: Yevseiev, Serhii, Khokhlachova, Yuliia, Ostapov, Serhii, Laptiev, Oleksandr
Subject Terms: crypto-code constructions, Cybersecurity, thema EDItEUR::U Computing and Information Technology::UR Computer security, simulation modelling, radio engineering research, models of the threat, automation, security measures
File Description: image/jpeg
-
5Book
Authors: Lars Hornuf, Sonja Mangold, Yayun Yang
Source: Advanced Studies in Diginomics and Digitalization ISBN: 9783031320637
Subject Terms: Data Regulation, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJH Entrepreneurship / Start-ups, Data Privacy, thema EDItEUR::U Computing and Information Technology::UR Computer security, Platform Economics, Crowdsourcing, thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNC Company, commercial and competition law: general, Crowdfounding, Digitalization, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, Data Protection, thema EDItEUR::K Economics, Finance, Business and Management::KF Finance and accounting::KFF Finance and the finance industry
File Description: image/jpeg; application/pdf
-
6Book
Authors: Čtvrtník, Mikuláš
Subject Terms: Archives and human rights, thema EDItEUR::N History and Archaeology::NH History::NHA History: theory and methods::NHAH Historiography, thema EDItEUR::U Computing and Information Technology::UR Computer security, Privacy protection, Personal data storage, Privacy rights, Right to be forgotten, thema EDItEUR::D Biography, Literature and Literary studies::D Biography, Literature and Literary studies::DS Literature: history and criticism, Archiving, Post-mortem privacy
File Description: image/jpeg; application/pdf
-
7Book
Authors: Julius Holderer
Subject Terms: IT-Security, 9. Industry and infrastructure, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security and Privacy, 16. Peace & justice, thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection, 12. Responsible consumption, Process Mining, Process Automation, Petri Net, Data Mining, Process Modeling, Process Security, Business Process Management, Compliance
File Description: image/jpeg; application/pdf; pdf
-
8Book
Authors: Guijarro, Jordi, Mhiri, Saber, CHOI, YOU-JUN
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security, Cybersecurity, Connected Vehicles, Automated Vehicles, Artificial Intelligence
File Description: image/jpeg; application/pdf
-
9
Contributors: Andreoni, Martin, Thakkar, Shreekant
Subject Terms: Open Access, Autonomous Systems, Generative AI, Large Language Models, Zero Trust Architecture, CyberPhysical Systems, UAV Swarms, Secure Communications, Distributed Intelligence, Real-Time Anomaly Detection, Machine Learning, Robotics, Security and Resilience, AI-Driven Approaches, Secure Autonomy, Safety-Critical Systems, Fault Mitigation, Swarm Intelligence, Secure Computing, Autonomous Robotics, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQM Machine learning, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, Industrial processes::TR Transport technology and trades
File Description: image/jpeg
Relation: Artificial Intelligence (R0); ONIX_20251128T131701_9789819510504_45; https://library.oapen.org/handle/20.500.12657/108702; https://library.oapen.org/bitstream/20.500.12657/108702/1/9789819510504.pdf
-
10
Contributors: Subhedar, Mansi, Mahalle, Parikshit, Pawar, Pranav
Subject Terms: energy management, renewable energy, Smart IoT, Sustainable Development Goals (SDG), Sustainable cities and communities, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UL Operating systems::ULR Real time operating systems, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKC Supercomputers, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
File Description: image/jpeg
Relation: ONIX_20251022T133414_9781040425046_4; https://library.oapen.org/handle/20.500.12657/107727; https://library.oapen.org/bitstream/20.500.12657/107727/1/9781040425046.pdf
-
11
Contributors: Sen, Jaydip
File Description: image/jpeg
Relation: ONIX_20250220_9781837696758_137; https://www.intechopen.com/books/1003954
-
12Book
Authors: Thatcher, Jim E., Dalton, Craig M.
Source: external_content.pdf
Subject Terms: Computers, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography::RGC Human geography, Data Science, Science & Technology Studies, Computer Science, Population Studies, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects, bic Book Industry Communication::U Computing & information technology::UN Databases::UNC Data capture & analysis
File Description: image/jpeg; application/pdf
Access URL: https://directory.doabooks.org/handle/20.500.12854/116099
https://www.jstor.org/stable/10.2307/j.ctv249sg9w
https://library.oapen.org/handle/20.500.12657/93679
https://directory.doabooks.org/handle/20.500.12854/146176
https://library.oapen.org/bitstream/20.500.12657/93679/1/external_content.pdf
https://library.oapen.org/handle/20.500.12657/93679 -
13Book
Authors: Yevseiev, Serhii, Ponomarenko, Volodymir, Laptiev, Oleksandr, Milov, Oleksandr, Korol, Olha, Milevskyi, Stanislav, Pohasii, Serhii, Tkachov, Andrii, Shmatko, Olexander, Melenti, Yevgen, Sievierinov, Оleksandr, Ostapov, Sergey, Gavrilova, Alla, Tsyhanenko, Oleksii, Herasimov, Sergey, Nyemkova, Elena, Tomashevsky, Bogdan, Hrod, Ivan, Opirskyy, Ivan, Zvieriev, Volodymyr, Prokopenko, Oleksandr, Savchenko, Vitalii, Barabash, Oleg, Sobchuk, Valentyn, Shuklin, German, Khvostenko, Vladyslav, Tymochko, Oleksandr, Pavlenko, Maksim, Trystan, Andrii, Florov, Serhii
Contributors: Yevseiev, Serhii, Ponomarenko, Volodymir, Laptiev, Oleksandr, Milov, Oleksandr
Subject Terms: Modeling of conflict-cooperative interaction, Cybersecurity, Algebraic geometric codes, thema EDItEUR::U Computing and Information Technology::UR Computer security, Crypto-code constructions, Classifiers of cyber threats
File Description: image/jpeg
-
14Book
Authors: Schrijvers, Eric, Prins, Corien, Passchier, R.
Source: Research for Policy ISBN: 9783030778378
Schrijvers, E, Prins, C & Passchier, R 2021, Preparing for digital disruption . Research for Policy, Springer Netherlands . https://doi.org/10.1007/978-3-030-77838-5Subject Terms: Critical Infrastructures, Cyber War, thema EDItEUR::U Computing and Information Technology::UR Computer security, Cyber Attacks, Critical Information Infrastructures, Cyber Insurance, Crisis Contingency Planning, thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology, 16. Peace & justice, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, Open Access, Disaster, Crisis Management, Cyber Security Policy, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administration, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
File Description: image/jpeg; application/pdf
-
15Book
Authors: Blum, Dan
Source: 2020_Book_RationalCybersecurityForBusine.pdf
Subject Terms: Cybersecurity strategy, Agile security, Cybersecurity, Cyber-resilience, Security governance, thema EDItEUR::U Computing and Information Technology::UR Computer security, Security culture, Rational Cybersecurity, Cybersecurity maturity model, Business Alignment, Rational cybersecurity, Shared responsibility, Modern identity, Leaders' Guide, Security championship, Open Access, Risk management, Cybersecurity RACIs, Computer security, Computer Science, Protección de datos, Security, DevSecOps, Sistemas de seguridad, Seguridad informática
File Description: image/jpeg; application/pdf; 349 páginas
Access URL: https://library.oapen.org/handle/20.500.12657/41762
https://library.oapen.org/bitstream/20.500.12657/41762/1/2020_Book_RationalCybersecurityForBusine.pdf
https://directory.doabooks.org/handle/20.500.12854/30469
https://library.oapen.org/handle/20.500.12657/41762
https://www.springer.com/9781484259528 -
16Book
Authors: Cheruvu, Sunil, Kumar, Anil, Smith, Ned, Wheeler, David M.
Subject Terms: Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security, Protección de datos, Seguridad informática - Normas, Computer communication systems, Demystifying internet, Information technology, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, Platform security, Computer science, Economía, Business—Data processing
File Description: image/jpeg; application/pdf; 515 páginas
Access URL: https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf
http://library.oapen.org/handle/20.500.12657/22840
https://directory.doabooks.org/handle/20.500.12854/39473
http://library.oapen.org/handle/20.500.12657/22840
https://www.springer.com/9781484228968 -
17
Contributors: Lacity, Mary C., Coon, Lynda
Subject Terms: Privacy, Data privacy, Surveillance, Surveillance Capitalism, Web 3, Cybersecurity, Virtual Worlds, Internet, Oppression, Healthcare data privacy, Supply chain privacy, Document privacy, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJD Business innovation, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, Business and Management::KJ Business and Management::KJQ Business mathematics and systems
File Description: application/pdf
Relation: Technology, Work and Globalization; ONIX_20240613_9783031510632_3
-
18
Contributors: Gkotsis, Ilias, Kavallieros, Dimitrios, Stoianov, Nikolai, Vrochidis, Stefanos, Diagourtas, Dimitrios, Akhgar, Babak
Subject Terms: Cyber Crime, Cyber Terrorism, Cyber Security, Border and External Security, Serious and Organized Crime, Critical Infrastructures Protection, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
File Description: application/pdf
Relation: Security Informatics and Law Enforcement; ONIX_20241021_9783031620836_11
-
19
Contributors: Kucharavy, Andrei, Plancherel, Octave, Mulder, Valentin, Mermoud, Alain, Lenders, Vincent
Subject Terms: large language models, cybersecurity, cyberdefense, neural networks, societal implications, risk management, LLMs, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security
File Description: application/pdf
Relation: ONIX_20240613_9783031548277_11
-
20
Contributors: Ouellet, Eric, D’Agata, Madeleine, Stewart, Keith
Subject Terms: Warfare and defence, International relations, Computer security, Ethical and social aspects of IT, thema EDItEUR::J Society and Social Sciences::JW Warfare and defence, thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects
File Description: image/jpeg
Relation: Beyond Boundaries; OCN: 1402763380; https://library.oapen.org/handle/20.500.12657/87415; https://library.oapen.org/bitstream/20.500.12657/87415/1/9781773854045_OA.pdf