:facetid:stream:\"streams/series/sbcysec\"OK:facetid:stream:streams/series/sbcysecYassine MalehYouness MalehCybersecurity in MoroccoSpringer Briefs in Cybersecurity1-92Springer2022Books and Thesesclosedseries/sbcysec/MalehM2210.1007/978-3-031-18475-8https://doi.org/10.1007/978-3-031-18475-8https://dblp.org/rec/series/sbcysec/MalehM22URL#570385Shun-Yung Kevin WangMing-Li HsiehDigital Robbery - ATM Hacking and ImplicationsSpringer Briefs in Cybersecurity1-53Springer2021Books and Thesesclosedseries/sbcysec/WangH2110.1007/978-3-030-70706-4https://doi.org/10.1007/978-3-030-70706-4https://dblp.org/rec/series/sbcysec/WangH21URL#1047774Samer Al-khateebNitin AgarwalDeviance in Social Media and Social Cyber Forensics - Uncovering Hidden Relations Using Open Source Information (OSINF)Springer Briefs in Cybersecurity1-94Springer2019Books and Thesesclosedseries/sbcysec/Al-khateebA1910.1007/978-3-030-13690-1https://doi.org/10.1007/978-3-030-13690-1https://dblp.org/rec/series/sbcysec/Al-khateebA19URL#1943607Aamo IorliamCybersecurity in Nigeria - A Case Study of Surveillance and Prevention of Digital CrimeSpringer Briefs in Cybersecurity1-55Springer2019Books and Thesesclosedseries/sbcysec/Iorliam1910.1007/978-3-030-15210-9https://doi.org/10.1007/978-3-030-15210-9https://dblp.org/rec/series/sbcysec/Iorliam19URL#1943608Greg AustinCybersecurity in China - The Next WaveSpringer Briefs in Cybersecurity1-130Springer2018Books and Thesesclosedseries/sbcysec/Austin1810.1007/978-3-319-68436-9https://doi.org/10.1007/978-3-319-68436-9https://dblp.org/rec/series/sbcysec/Austin18URL#2362836Martin SchallbruchIsabel SkierkaCybersecurity in GermanySpringer Briefs in Cybersecurity1-66Springer2018Books and Thesesclosedseries/sbcysec/SchallbruchS1810.1007/978-3-319-90014-8https://doi.org/10.1007/978-3-319-90014-8https://dblp.org/rec/series/sbcysec/SchallbruchS18URL#2362837Philippe BaumardCybersecurity in FranceSpringer Briefs in Cybersecurity1-106Springer2017Books and Thesesclosedseries/sbcysec/Baumard1710.1007/978-3-319-54308-6https://doi.org/10.1007/978-3-319-54308-6https://dblp.org/rec/series/sbcysec/Baumard17URL#2738648Lior TabanskyIsaac Ben IsraelCybersecurity in IsraelSpringer Briefs in Cybersecurity1-73Springer2015Books and Thesesclosedseries/sbcysec/TabanskyI1510.1007/978-3-319-18986-4https://doi.org/10.1007/978-3-319-18986-4https://dblp.org/rec/series/sbcysec/TabanskyI15URL#3394469Norberto Nuno Gomes de AndradeLisha Chen-WilsonDavid ArglesMichele Schiano di ZeniseGary B. WillsElectronic IdentitySpringer Briefs in Cybersecurity1-90Springer2014Books and Thesesclosedseries/sbcysec/AndradeCAZW1410.1007/978-1-4471-6449-4https://doi.org/10.1007/978-1-4471-6449-4https://dblp.org/rec/series/sbcysec/AndradeCAZW14URL#3697702Myriam Dunn CaveltyCybersecurity in SwitzerlandSpringer Briefs in Cybersecurity1-75Springer2014Books and Thesesclosedseries/sbcysec/Cavelty1410.1007/978-3-319-10620-5https://doi.org/10.1007/978-3-319-10620-5https://dblp.org/rec/series/sbcysec/Cavelty14URL#3697703Sophie Stalla-BourdillonJoshua PhillipsMark Dermot RyanPrivacy vs. SecuritySpringer Briefs in Cybersecurity1-115Springer2014Books and Thesesclosedseries/sbcysec/Stalla-BourdillonPR1410.1007/978-1-4471-6530-9https://doi.org/10.1007/978-1-4471-6530-9https://dblp.org/rec/series/sbcysec/Stalla-BourdillonPR14URL#3697704Alana MaurushatDisclosure of Security Vulnerabilities - Legal and Ethical Issues.Springer Briefs in CybersecurityI-X, 1-121Springer2013Books and Thesesclosedbooks/daglib/0031817http://www.springer.com/computer/general+issues/book/978-1-4471-5003-9https://dblp.org/rec/books/daglib/0031817URL#3984173Heli Tiirmaa-KlaarJan GassenElmar Gerhards-PadillaPeter MartiniBotnets.Springer Briefs in CybersecurityI-VIII, 1-97Springer2013Books and Thesesclosedbooks/daglib/003224410.1007/978-1-4471-5216-3https://doi.org/10.1007/978-1-4471-5216-3https://dblp.org/rec/books/daglib/0032244URL#3984197Rebecca WongData Security Breaches and Privacy in Europe.Springer Briefs in Cybersecurity1-50Springer2013Books and Thesesclosedbooks/sp/Wong1310.1007/978-1-4471-5586-7https://doi.org/10.1007/978-1-4471-5586-7https://dblp.org/rec/books/sp/Wong13URL#3984434Rolf H. WeberUlrike I. HeinrichAnonymization.Springer Briefs in CybersecurityI-VII, 1-73Springer2012Books and Thesesclosedbooks/daglib/002997810.1007/978-1-4471-4066-5https://doi.org/10.1007/978-1-4471-4066-5https://dblp.org/rec/books/daglib/0029978URL#4265547