|
1. |
Osterhage, Wolfgang W.: Sicherheitskonzepte in der mobilen Kommunikation : Drahtlose Kommunikation – Protokolle und Gefahren / Wolfgang W. Osterhage. - Berlin ; [Heidelberg]: Springer Vieweg, [2018]. - XI, 161 Seiten : Diagramme, ISBN 978-3-662-57902-2
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
|
Shelfmark: LN-U 10-18942
|
|
2. |
Westhoff, Dirk: Mobile Security : Schwachstellen verstehen und Angriffsszenarien nachvollziehen / Dirk Westhoff. - Berlin: Springer Vieweg, [2020]. - XXV, 262 Seiten : Illustrationen, Diagramme, ISBN 978-3-662-60854-8
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
|
Shelfmark: LN-U 10-19377
|
|
3. |
Advances in Information and Computer Security : 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings / edited by Kazuto Ogawa, Katsunari Yoshioka. - Cham: Springer, 2016. - Online-Ressource (XII, 335 p. 64 illus, online resource), ISBN 978-3-319-44524-3 (Lecture Notes in Computer Science ; 9836) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 9836) DOI: 10.1007/978-3-319-44524-3
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
4. |
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / edited by Liqun Chen, Jinguang Han. - Cham: Springer, 2016. - Online-Ressource (XIII, 394 p. 34 illus, online resource), ISBN 978-3-319-47422-9 (Lecture Notes in Computer Science ; 10005) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 10005) DOI: 10.1007/978-3-319-47422-9
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
5. |
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing. - Cham: Springer, 2016. - Online-Ressource (XII, 478 p. 83 illus, online resource), ISBN 978-3-319-50011-9 (Lecture Notes in Computer Science ; 9977) (Security and Cryptology ; 9977) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-50011-9
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
6. |
Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / edited by Sara Foresti, Giuseppe Persiano. - Cham: Springer, 2016. - Online-Ressource (XVI, 762 p. 116 illus, online resource), ISBN 978-3-319-48965-0 (Lecture Notes in Computer Science ; 10052) (SpringerLink : Bücher) (Security and Cryptology ; 10052) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-48965-0
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
7. |
Information Security Applications : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers / edited by Ho-won Kim, Dooho Choi. - 1st ed. 2016. - Cham: Springer, 2016. - Online-Ressource (XVI, 438 p. 127 illus, online resource), ISBN 978-3-319-31875-2 (Lecture Notes in Computer Science ; 9503) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 9503) DOI: 10.1007/978-3-319-31875-2
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
8. |
Security and Cryptography for Networks : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / edited by Vassilis Zikas, Roberto De Prisco. - Cham: Springer, 2016. - Online-Ressource (XIX, 606 p. 75 illus, online resource), ISBN 978-3-319-44618-9 (Lecture Notes in Computer Science ; 9841) (SpringerLink : Bücher) (Security and Cryptology ; 9841) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-44618-9
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
9. |
Steffens, Timo: Auf der Spur der Hacker : Wie man die Täter hinter der Computer-Spionage enttarnt / von Timo Steffens. - Berlin, Heidelberg: Springer Vieweg, 2018. - Online-Ressource (XII, 171 S. 10 Abb, online resource), ISBN 978-3-662-55954-3 (SpringerLink : Bücher) DOI: 10.1007/978-3-662-55954-3
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
10. |
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers / edited by Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou. - 1st ed. 2016. - Cham: Springer, 2016. - Online-Ressource (XIV, 388 p. 139 illus, online resource), ISBN 978-3-319-31664-2 (Lecture Notes in Computer Science ; 8985) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 8985) (SpringerLink : Bücher) DOI: 10.1007/978-3-319-31664-2
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
11. |
Critical Information Infrastructures Security : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen. - Cham: Springer, 2016. - Online-Ressource (XIII, 266 p. 74 illus, online resource), ISBN 978-3-319-33331-1 (Lecture Notes in Computer Science ; 9578) (Security and Cryptology ; 9578) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-33331-1
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
12. |
Schemberg, Axel: PC-Netzwerke : das umfassende Handbuch / Axel Schemberg, Martin Linten, Kai Surendorf. - 9. aktualisierte und erweiterte Auflage. - Bonn: Rheinwerk Verlag, [2023]. - 831 Seiten : Illustrationen, Diagramme, ISBN 978-3-8362-8528-5 (Rheinwerk Computing)
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
|
Shelfmark: LN-U 10-13818::(9)
|
|
13. |
Lunkeit, Armin: Security by Design : Security Engineering informationstechnischer Systeme / Armin Lunkeit, Wolf Zimmer. - Berlin: Springer Vieweg, [2021]. - 1 Online-Ressource (xiv, 420 Seiten) : Illustrationen, Diagramme, ISBN 978-3-662-62917-8 (Springer eBook Collection) DOI: 10.1007/978-3-662-62917-8
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
14. |
Deusch, Florian: Beauftragte für IT-Sicherheit und Informationssicherheit / von Dr. Florian Deusch und Professor Dr. Tobias Eggendorfer. - Frankfurt am Main: Fachmedien Recht und Wirtschaft, dfv Mediengruppe, [2024]. - 1 Online-Ressource (XIX, 310 Seiten), ISBN 978-3-8005-9693-5 (Schriftenreihe Kommunikation & Recht) (R&W-Online Datenbank)
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
15. |
Kurz, Constanze: Cyberwar - die Gefahr aus dem Netz : wer uns bedroht und wie wir uns wehren können / Constanze Kurz und Frank Rieger. - München: C. Bertelsmann, 2018. - 287 Seiten, ISBN 978-3-570-10351-7
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
|
available for loan ![3D-Plan](https://www.ub.uni-heidelberg.de/nav4/grafik/3d-plan-icon.png)
Shelfmark: 2018 A 11117
|
|
16. |
Simić-Draws, Daniela: IT-Sicherheitsanalysen : ein prozessorientiertes Vorgehensmodell / Daniela Simić. - Berlin ; Boston: De Gruyter Oldenbourg, [2017]. - XII, 252 Seiten : Illustrationen, Diagramme, ISBN 978-3-11-051492-6
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
|
Shelfmark: LN-U 10-18385
|
|
17. |
Manipulationssichere Cloud-Infrastrukturen : Nachhaltige Digitalisierung durch Sealed Cloud Security / Hubert A. Jäger, Ralf O.G. Rieken, Hrsg.. - Wiesbaden: Springer Vieweg, [2020]. - 1 Online-Ressource (XXV, 241 Seiten), ISBN 978-3-658-31849-9 (Springer eBook Collection) DOI: 10.1007/978-3-658-31849-9
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
18. |
Harich, Thomas W.: IT-Sicherheitsmanagement : Arbeitsplatz IT-Security-Manager / Thomas W. Harich. - 1. Aufl.. - Heidelberg ; München ; Landsberg ; Frechen ; Hamburg: mitp, 2012. - 469 S. : graph. Darst., ISBN 978-3-8266-9193-5
![Book/no value](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/book.png) Book/no value
![Table of content](/https/katalog.ub.uni-heidelberg.de/opacicon/text_list_numbers_g.png) Table of content: 1, 2
|
|
|
19. |
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / edited by Joseph K. Liu, Ron Steinfeld. - Cham: Springer, 2016. - Online-Ressource (XVIII, 543 p. 114 illus, online resource), ISBN 978-3-319-40253-6 (Lecture Notes in Computer Science ; 9722) (Security and Cryptology ; 9722) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-40253-6
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
20. |
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / edited by Joseph K. Liu, Ron Steinfeld. - Cham: Springer, 2016. - Online-Ressource (XVIII, 517 p. 46 illus, online resource), ISBN 978-3-319-40367-0 (Lecture Notes in Computer Science ; 9723) (SpringerLink : Bücher) (Security and Cryptology ; 9723) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-40367-0
![Online resource](/https/katalog.ub.uni-heidelberg.de/opacicon/silk/page_world.png) Online resource
|
|
|
|