Computers Security Cryptography

Showing 1 - 12 of 35 results

Search Titles

Below Are Your Selected Attending Tradeshow


The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Fore...

by AAron Walters, Andrew Case, Jamie Levy, AAron Walters
  • Published in 2014
  • 912
Archives in the Digital Age - Protection and theRight to be Forgotten

Archives in the Digita...

by Abderrazak Mkadmi
  • Published in 2021
Cybersecurity in Humanities and Social Sciences -A Research Methods Approach

Cybersecurity in Human...

by Hugo Loiseau
  • Published in 2020
  • 240
Cyber Security and Digital Forensics

Cyber Security and Dig...

by Mangesh M. Ghonge
  • Published in 2021
  • 350
Security Issues and Privacy Concerns in Industry 4.0 Applications

Security Issues and Pr...

  • Published in 2021
  • 350
The CISO Evolution: Business Knowledge for Cybersecurity Executives

The CISO Evolution: Bu...

by Matthew K. Sharp
  • Published in 2022
  • 336
Building Secure Cars - Assuring the AutomotiveSoftware Development Lifecycle

Building Secure Cars -...

by Dennis Kengo Oka
  • Published in 2021
  • 275
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program

Corporate Cybersecurit...

by John Jackson
  • Published in 2021
  • 220
Red Fox: Vulnerability Analysis and Exploit Mitigation Internals for Mobile and IoT

Red Fox: Vulnerability...

by Maria Markstedter
Blue Fox: Arm Assembly Internals and Binary Analysis of Mobile and IoT Devices

Blue Fox: Arm Assembly...

by Maria Markstedter
Cyber Operations: A Case Study Approach

Cyber Operations: A Ca...

by Jerry M. Couretas

Showing 1 - 12 of 35 results

loading