![book Kryptographie und IT-Sicherheit: Grundlagen und Anwendungen](/covers/files_170/2642000/f28cf8c8943a5c444a7518380a3da43c.jpg)
- Author: Joachim Swoboda Stephan Spitz Michael Pramateftakis (auth.)
- Language: German
- Year: 2008
![book Cyber-physical attack recovery procedures: a step-by-step preparation and response guide](/covers/files_170/2599000/2debe19ab55e84c4818e9454c53dfc94-g.jpg)
- Author: Ayala Luis
- Language: English
- Year: 2016
![book Information Fusion for Cyber-Security Analytics](/covers/files_170/2566000/d2b8ad0cb63c978ad99fcd5ed587bab0-g.jpg)
- Author: Aleroud Ahmed, Alsmadi Izzat M., Karabatis George
- Language: English
- Year: 2017
![book Computer Security And The Internet: Tools And Jewels](/covers/files_170/2496000/9d0397f770151843ab7dfa75507f559f-g.jpg)
- Author: Paul C. Van Oorschot
- Language: English
- Year: 2020
- Author: Herwig Unger
- Language: German
- Year: 2018
Sicherheitskonzepte in der mobilen Kommunikation : Drahtlose Kommunikation – Protokolle und Gefahren
pdf
- Author: Wolfgang W. Osterhage
- Language: German
- Year: 2018