Yazar
Handschuh, Helena. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies
Yazar
Joye, Marc. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Patra, Arpita. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Foley, Simon N. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Hameurlain, Abdelkader. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Cuppens-Boulahia, Nora. editor.
Format:
Electronic Resources
Alıntı:
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product
Yazar
Zhu, Liehuang. author.
Format:
Electronic Resources
Alıntı:
agreement and management. Secondly, various cryptographic schemes/protocols used to protect data
Yazar
Li, Kuan-Ching. editor.
Format:
Electronic Resources
Alıntı:
This book provides state-of-the-art coverage of the principles, techniques, and management of
Yazar
Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X
Format:
Electronic Resources
Alıntı:
sections: authentication, failures of security management, security management/forensic, and software