Memmo LogoMemmo - AI-verktyg och digital kurslitteratur
KurslitteraturKurser
Logga in / Skapa konto
Memmo Logo
Studieplattformen som hjälper studenter plugga smartare och få bättre betyg. Älskat av 25 000+ studenter.
© 2026 Bright Education AB
Stockholm, Sverige
Funktioner
  • Quiz
  • Flashcards
  • Sammanfattningar
  • AI-chatt
  • Podcast
  • Kurslitteratur
  • GPA-beräknare
  • Bokkategorier
Företag
  • FAQ
  • Artiklar
  • Om oss
  • Karriär
Annat
  • Mejla oss
  • Integritet
  • Villkor
AWS StartupsGoogle for StartupsMicrosoft for Startups
  • Hem
  • Alla kategorier
  • Cybersäkerhet, Moln & IoT

Kurslitteratur inom Cybersäkerhet, Moln & IoT

All kurslitteratur du behöver för studier inom Cybersäkerhet, Moln & IoT. Här hittar du ett brett utbud av e-böcker inom Cybersäkerhet, Moln & IoT hos oss. Hittar du inte vad du söker? Sök på ISBN, titel eller författare.

3 537 Böcker

Secure Data Provenance and Inference Control with Semantic Web by Bhavani Thuraisingham, Murat Kantarcioglu, Tyrone Cadenhead, Vaibhav Khadilkar

Secure Data Provenance and Inference Control with Semantic Web

Bhavani Thuraisingham, Murat Kantarcioglu, Tyrone Cadenhead, Vaibhav Khadilkar

611 kr

PCI Compliance by Abhay Bhargav

PCI Compliance

Abhay Bhargav

1344 kr

The Frugal CISO by Kerry Ann Anderson

The Frugal CISO

Kerry Ann Anderson

586 kr

Security for Multihop Wireless Networks by Jaime Lloret Mauri, Shafiullah Khan

Security for Multihop Wireless Networks

Jaime Lloret Mauri, Shafiullah Khan

647 kr

The State of the Art in Intrusion Prevention and Detection by Al-Sakib Khan Pathan

The State of the Art in Intrusion Prevention and Detection

Al-Sakib Khan Pathan

709 kr

Secure Development for Mobile Apps by J. D. Glaser

Secure Development for Mobile Apps

J. D. Glaser

709 kr

Hardware Security by Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

Hardware Security

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

1344 kr

Wireless Ad hoc and Sensor Networks by Jagannathan Sarangapani

Wireless Ad hoc and Sensor Networks

Jagannathan Sarangapani

709 kr

RFID Handbook by Mohammad Ilyas, Syed A. Ahson

RFID Handbook

Mohammad Ilyas, Syed A. Ahson

2445 kr

Wireless Security and Cryptography by Nicolas Sklavos, Xinmiao Zhang

Wireless Security and Cryptography

Nicolas Sklavos, Xinmiao Zhang

1955 kr

Embedded Systems Handbook by Richard Zurawski

Embedded Systems Handbook

Richard Zurawski

2872 kr

Cybersecurity Risk Management by Jayet Moon, Jeet Shah

Cybersecurity Risk Management

Jayet Moon, Jeet Shah

642 kr

Official (ISC)2 Guide to the SSCP CBK by Harold F. Tipton, J D Dewar, R Anderson

Official (ISC)2 Guide to the SSCP CBK

Harold F. Tipton, J D Dewar, R Anderson

929 kr

Handbook of Financial Cryptography and Security by Burton Rosenberg

Handbook of Financial Cryptography and Security

Burton Rosenberg

563 kr

Cloud Computing Strategies by Dimitris N. Chorafas

Cloud Computing Strategies

Dimitris N. Chorafas

806 kr

Access Control, Security, and Trust by Shiu-Kai Chin, Susan Beth Older

Access Control, Security, and Trust

Shiu-Kai Chin, Susan Beth Older

733 kr

Information Security Management Handbook, Volume 4 by Harold F. Tipton, Micki Krause Nozaki

Information Security Management Handbook, Volume 4

Harold F. Tipton, Micki Krause Nozaki

758 kr

Cloud Computing by Brian J.S. Chee, Curtis Franklin Jr.

Cloud Computing

Brian J.S. Chee, Curtis Franklin Jr.

647 kr

Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold

Managing an Information Security and Privacy Awareness and Training Program

Rebecca Herold

1773 kr

Information Security Management by Bel G. Raggad

Information Security Management

Bel G. Raggad

1283 kr

Cybersecurity Hyperglossary by Gary Hinson

Cybersecurity Hyperglossary

Gary Hinson

586 kr

Guide to SRv6 Network Deployment by Lanjun Luo, Minwei Jin, Weidong Li, Zhenbin Li

Guide to SRv6 Network Deployment

Lanjun Luo, Minwei Jin, Weidong Li, Zhenbin Li

1712 kr

Quantum Computing by Abdullah S. Alessa, Abdullah T. Alessa, Amro M. Sherbeeni, Clinton M. Firth, Mohammad Hammoudeh

Quantum Computing

Abdullah S. Alessa, Abdullah T. Alessa, Amro M. Sherbeeni, Clinton M. Firth, Mohammad Hammoudeh

709 kr

Behavioral Cybersecurity by Cynthia E. Winston-Proctor, Wayne Patterson

Behavioral Cybersecurity

Cynthia E. Winston-Proctor, Wayne Patterson

245 kr

← FöregåendeSida 54 av 148Nästa →