Skip navigation
University library of Heidelberg
Please note that your choice of borrowing branch library affects which collection points you will be offered when ordering or reserving items. It is also relevant for deciding the loan status of items ('for loan', 'for order', etc.)
+ Search history (1 Search)
DigiKat (1936-1961): - Parallel search in Digikat is still running... RSSDrucker
Folder
|<  [1-20]  [21-40]  [41-60]  [61-80]  [81-100] ... >|
sort by: 
No subject group preferred

Refine results:

6290 doc. < 1825
 to  
 
1. Osterhage, Wolfgang W.: Sicherheitskonzepte in der mobilen Kommunikation : Drahtlose Kommunikation – Protokolle und Gefahren / Wolfgang W. Osterhage. -
Berlin ; [Heidelberg]: Springer Vieweg, [2018]. - XI, 161 Seiten : Diagramme, ISBN 978-3-662-57902-2
Book/no value 
Shelfmark: LN-U 10-18942
2. Westhoff, Dirk: Mobile Security : Schwachstellen verstehen und Angriffsszenarien nachvollziehen / Dirk Westhoff. -
Berlin: Springer Vieweg, [2020]. - XXV, 262 Seiten : Illustrationen, Diagramme, ISBN 978-3-662-60854-8
Book/no value 
Shelfmark: LN-U 10-19377
3. Advances in Information and Computer Security : 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings / edited by Kazuto Ogawa, Katsunari Yoshioka. -
Cham: Springer, 2016. - Online-Ressource (XII, 335 p. 64 illus, online resource), ISBN 978-3-319-44524-3
(Lecture Notes in Computer Science ; 9836)
(Springer eBook Collection : Computer Science)
(SpringerLink : Bücher)
(Security and Cryptology ; 9836)
DOI: 10.1007/978-3-319-44524-3
Online resource 
4. Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / edited by Liqun Chen, Jinguang Han. -
Cham: Springer, 2016. - Online-Ressource (XIII, 394 p. 34 illus, online resource), ISBN 978-3-319-47422-9
(Lecture Notes in Computer Science ; 10005)
(Springer eBook Collection : Computer Science)
(SpringerLink : Bücher)
(Security and Cryptology ; 10005)
DOI: 10.1007/978-3-319-47422-9
Online resource 
5. Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing. -
Cham: Springer, 2016. - Online-Ressource (XII, 478 p. 83 illus, online resource), ISBN 978-3-319-50011-9
(Lecture Notes in Computer Science ; 9977)
(Security and Cryptology ; 9977)
(SpringerLink : Bücher)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-50011-9
Online resource 
6. Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / edited by Sara Foresti, Giuseppe Persiano. -
Cham: Springer, 2016. - Online-Ressource (XVI, 762 p. 116 illus, online resource), ISBN 978-3-319-48965-0
(Lecture Notes in Computer Science ; 10052)
(SpringerLink : Bücher)
(Security and Cryptology ; 10052)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-48965-0
Online resource 
7. Information Security Applications : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers / edited by Ho-won Kim, Dooho Choi. - 1st ed. 2016. -
Cham: Springer, 2016. - Online-Ressource (XVI, 438 p. 127 illus, online resource), ISBN 978-3-319-31875-2
(Lecture Notes in Computer Science ; 9503)
(Springer eBook Collection : Computer Science)
(SpringerLink : Bücher)
(Security and Cryptology ; 9503)
DOI: 10.1007/978-3-319-31875-2
Online resource 
8. Security and Cryptography for Networks : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / edited by Vassilis Zikas, Roberto De Prisco. -
Cham: Springer, 2016. - Online-Ressource (XIX, 606 p. 75 illus, online resource), ISBN 978-3-319-44618-9
(Lecture Notes in Computer Science ; 9841)
(SpringerLink : Bücher)
(Security and Cryptology ; 9841)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-44618-9
Online resource 
9. Steffens, Timo: Auf der Spur der Hacker : Wie man die Täter hinter der Computer-Spionage enttarnt / von Timo Steffens. -
Berlin, Heidelberg: Springer Vieweg, 2018. - Online-Ressource (XII, 171 S. 10 Abb, online resource), ISBN 978-3-662-55954-3
(SpringerLink : Bücher)
DOI: 10.1007/978-3-662-55954-3
Online resource 
10. Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers / edited by Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou. - 1st ed. 2016. -
Cham: Springer, 2016. - Online-Ressource (XIV, 388 p. 139 illus, online resource), ISBN 978-3-319-31664-2
(Lecture Notes in Computer Science ; 8985)
(Springer eBook Collection : Computer Science)
(Security and Cryptology ; 8985)
(SpringerLink : Bücher)
DOI: 10.1007/978-3-319-31664-2
Online resource 
11. Critical Information Infrastructures Security : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen. -
Cham: Springer, 2016. - Online-Ressource (XIII, 266 p. 74 illus, online resource), ISBN 978-3-319-33331-1
(Lecture Notes in Computer Science ; 9578)
(Security and Cryptology ; 9578)
(SpringerLink : Bücher)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-33331-1
Online resource 
12. Schemberg, Axel: PC-Netzwerke : das umfassende Handbuch / Axel Schemberg, Martin Linten, Kai Surendorf. - 9. aktualisierte und erweiterte Auflage. -
Bonn: Rheinwerk Verlag, [2023]. - 831 Seiten : Illustrationen, Diagramme, ISBN 978-3-8362-8528-5
(Rheinwerk Computing)
Book/no value 
Shelfmark: LN-U 10-13818::(9)
13. Lunkeit, Armin: Security by Design : Security Engineering informationstechnischer Systeme / Armin Lunkeit, Wolf Zimmer. -
Berlin: Springer Vieweg, [2021]. - 1 Online-Ressource (xiv, 420 Seiten) : Illustrationen, Diagramme, ISBN 978-3-662-62917-8
(Springer eBook Collection)
DOI: 10.1007/978-3-662-62917-8
Online resource 
14. Deusch, Florian: Beauftragte für IT-Sicherheit und Informationssicherheit / von Dr. Florian Deusch und Professor Dr. Tobias Eggendorfer. -
Frankfurt am Main: Fachmedien Recht und Wirtschaft, dfv Mediengruppe, [2024]. - 1 Online-Ressource (XIX, 310 Seiten), ISBN 978-3-8005-9693-5
(Schriftenreihe Kommunikation & Recht)
(R&W-Online Datenbank)
Online resource 
15. Kurz, Constanze: Cyberwar - die Gefahr aus dem Netz : wer uns bedroht und wie wir uns wehren können / Constanze Kurz und Frank Rieger. -
München: C. Bertelsmann, 2018. - 287 Seiten, ISBN 978-3-570-10351-7
Book/no value 
available for loan  3D-Plan
Shelfmark: 2018 A 11117
16. Simić-Draws, Daniela: IT-Sicherheitsanalysen : ein prozessorientiertes Vorgehensmodell / Daniela Simić. -
Berlin ; Boston: De Gruyter Oldenbourg, [2017]. - XII, 252 Seiten : Illustrationen, Diagramme, ISBN 978-3-11-051492-6
Book/no value 
Shelfmark: LN-U 10-18385
17. Manipulationssichere Cloud-Infrastrukturen : Nachhaltige Digitalisierung durch Sealed Cloud Security / Hubert A. Jäger, Ralf O.G. Rieken, Hrsg.. -
Wiesbaden: Springer Vieweg, [2020]. - 1 Online-Ressource (XXV, 241 Seiten), ISBN 978-3-658-31849-9
(Springer eBook Collection)
DOI: 10.1007/978-3-658-31849-9
Online resource 
18. Harich, Thomas W.: IT-Sicherheitsmanagement : Arbeitsplatz IT-Security-Manager / Thomas W. Harich. - 1. Aufl.. -
Heidelberg ; München ; Landsberg ; Frechen ; Hamburg: mitp, 2012. - 469 S. : graph. Darst., ISBN 978-3-8266-9193-5
Book/no value 
 Table of content: 1, 2
Shelfmark: LN-U 10-16609
19. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / edited by Joseph K. Liu, Ron Steinfeld. -
Cham: Springer, 2016. - Online-Ressource (XVIII, 543 p. 114 illus, online resource), ISBN 978-3-319-40253-6
(Lecture Notes in Computer Science ; 9722)
(Security and Cryptology ; 9722)
(SpringerLink : Bücher)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-40253-6
Online resource 
20. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / edited by Joseph K. Liu, Ron Steinfeld. -
Cham: Springer, 2016. - Online-Ressource (XVIII, 517 p. 46 illus, online resource), ISBN 978-3-319-40367-0
(Lecture Notes in Computer Science ; 9723)
(SpringerLink : Bücher)
(Security and Cryptology ; 9723)
(Springer eBook Collection : Computer Science)
DOI: 10.1007/978-3-319-40367-0
Online resource 
Folder
|<  [1-20]  [21-40]  [41-60]  [61-80]  [81-100] ... >|
Library holdings published up to 1961 see also DigiKat.
zum Seitenanfang