Networks

Sort these publications by...

Results Found

The Secure CiO: How to Hire and Retain Great Cyber Security Talent to Protect your Organisation

The Uncertainty Analysis of Model Results: A Practical Guide

The Uncertainty Analysis of Model Results: A Practical Guide

  • Author: Hofer, Eduard

Not yet published: available to order Availability help (opens in new window)

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities

  • Author: Ng, Alex Chi Keung

Not yet published: available to order Availability help (opens in new window)

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT

Reversible and Quantum Circuits: Optimization and Complexity Analysis

Reversible and Quantum Circuits: Optimization and Complexity Analysis

  • Author: Abdessaied, Nabila Drechsler,...

Not yet published: available to order Availability help (opens in new window)

Cooperative Ofdm Underwater Acoustic Communications

Cooperative Ofdm Underwater Acoustic Communications

  • Author: Cheng, Xilin Yang, Liuqing ...

Not yet published: available to order Availability help (opens in new window)

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

  • Author: Petrenko, Sergei

Not yet published: available to order Availability help (opens in new window)

3D Printing for Model Engineers: A Practical Guide

3D Printing for Model Engineers: A Practical Guide

  • Author: Wyatt, Neil

Not yet published: available to order Availability help (opens in new window)

The Perfect Weapon: war, sabotage, and fear in the cyber age

NewThe Perfect Weapon: war, sabotage, and fear in the cyber age

  • Author: Sanger, David

In Stock: 3 - 5 days Availability help (opens in new window)