Works about INFORMATION technology security


Results: 4620
    1
    2
    3
    4
    5
    6

    A multi-image steganography: ISS.

    Published in:
    Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00333-6
    By:
    • Zhang, Shihao;
    • Xiao, Yanhui;
    • Tian, Huawei;
    • Li, Xiaolong
    Publication type:
    Article
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    20
    21
    22
    23
    24
    25
    26

    INTRODUCTION TO THIS ISSUE.

    Published in:
    Career Planning & Adult Development Journal, 2017, v. 33, n. 1, p. 5
    By:
    • Venable, Melissa A.
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49

    Guest Editorial.

    Published in:
    IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 5, p. 223, doi. 10.1049/iet-ifs.2016.0333
    By:
    • Mentens, Nele;
    • Sauveron, Damien;
    • Sierra, José M.;
    • Wang, Shiuh‐Jeng;
    • Woungang, Isaac
    Publication type:
    Article
    50