Torthaí cuardaigh
-
1
The law and economics of cybersecurity edited by Mark F. Grady, Francesco Parisi.
Foilsithe / Cruthaithe 2006LEABHAR -
2
-
3
Biologically Inspired Cognitive architectures (BICA) for young scientists proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity...
Foilsithe / Cruthaithe 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
4
Intelligent data analysis for e-Learning enhancing security and trustworthiness in online learning systems
Foilsithe / Cruthaithe 2017Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
5
-
6
International Conference on Applications and Techniques in Cyber Security and Intelligence applications and techniques in cyber security and intelligence
Foilsithe / Cruthaithe 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
7
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications
Foilsithe / Cruthaithe 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
8
Hardware security design, threats, and safeguards
Foilsithe / Cruthaithe 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
9
The art of software security assessment identifying and preventing software vulnerabilities
Foilsithe / Cruthaithe 2007LEABHAR -
10