-
1Book
Authors: Coyne, Richard
Subject Terms: smart city, code, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RP Regional and area planning::RPC Urban and municipal planning and policy, 11. Sustainability, Cryptography, cities, urbanism, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, encryption, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society
File Description: image/jpeg
-
2
Contributors: Lustenberger, Michael, Spychiger, Florian, Küng, Lukas
Subject Terms: Open Access, Blockchain, Governance mechanisms, Organizational design, DAO, Decision making, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJU Organizational theory and behaviour, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UF Business applications, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UN Databases, Business and Management::KJ Business and Management::KJR Corporate governance: role and responsibilities of boards and directors, Business and Management::KC Economics::KCA Economic theory and philosophy
File Description: image/jpeg
Relation: Springer Proceedings in Business and Economics; Business and Management; Business and Management (R0); ONIX_20251128T131701_9783032032737_18; https://library.oapen.org/handle/20.500.12657/108658; https://library.oapen.org/bitstream/20.500.12657/108658/1/9783032032737.pdf
-
3
Contributors: Miciuła, Ireneusz
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
File Description: image/jpeg
Relation: ONIX_20250220_9780854662173_46; https://www.intechopen.com/books/1002408
-
4
Contributors: Mayer, Joceli
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
File Description: image/jpeg
Relation: ONIX_20250220_9780854669011_103; https://www.intechopen.com/books/1003370
-
5
Contributors: Duenas-Cid, David, Roenne, Peter, Volkamer, Melanie, Budurushi, Jurlind, Blom, Michelle, Rodríguez-Pérez, Adrià, Spycher-Krivonosova, Iuliia, Castellà Roca, Jordi, Barrat Esteve, Jordi
Subject Terms: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
File Description: application/pdf
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27
-
6
Contributors: Hajian, Aram, Baloian, Nelson, Inoue, Tomoo, Luther, Wolfram
Subject Terms: Computer system organization, Computing methodologies, Applied computing, Human-centered computing, Security, thema EDItEUR::U Computing and Information Technology, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKM Embedded systems, thema EDItEUR::U Computing and Information Technology::UN Databases::UNC Data capture and analysis, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
File Description: image/jpeg
Relation: ONIX_20241119_9783832558550_35
-
7
Contributors: Duenas-Cid, David, Roenne, Peter, Volkamer, Melanie, Budurushi, Jurlind, Blom, Michelle, Rodríguez-Pérez, Adrià, Spycher-Krivonosova, Iuliia, Castellà Roca, Jordi, Barrat Esteve, Jordi
Subject Terms: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
File Description: image/jpeg
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27; https://library.oapen.org/handle/20.500.12657/93864
-
8Book
Authors: Sloan, Robert, Warner, Richard
Subject Terms: norm, optimal, thema EDItEUR::U Computing and Information Technology::UR Computer security, STM, Cryptology, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, IT Security, Crisis, INFORMATIONSCIENCE, SCI-TECH, COMPUTERSCIENCE, Online, inspection, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, CHOICE Highly Recommended Title, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, vulnerabilities, malware, software, packet, Data Preparation and Mining, ITECH, Access, InfoSECURITY, defense, Privacy, deep, Security, Unauthorized, perfect
File Description: image/jpeg; application/pdf
Access URL: https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://directory.doabooks.org/handle/20.500.12854/33106
https://library.oapen.org/handle/20.500.12657/41680
https://directory.doabooks.org/handle/20.500.12854/26758
https://library.oapen.org/handle/20.500.12657/40085
https://library.oapen.org/bitstream/20.500.12657/40085/1/9781138436923.pdf
https://www.taylorfrancis.com/books/9780429093791
https://library.oapen.org/handle/20.500.12657/41680
https://library.oapen.org/handle/20.500.12657/40085 -
9
Authors: Sloan, Robert H., Warner, Richard
Subject Terms: CHOICE Highly Recommended Title, Data Preparation and Mining, IT Security, Cryptology, InfoSECURITY, SCI-TECH, COMPUTERSCIENCE, ITECH, INFORMATIONSCIENCE, STM, deep, defense, inspection, malware, norm, optimal, packet, perfect, software, vulnerabilities, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
File Description: image/jpeg
Relation: ONIX_20200921_9781439830147_40; OCN: 857078800; https://library.oapen.org/handle/20.500.12657/41680; https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf