-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Cyber Forensics and Digital Security
In today's hyperconnected world, where digital transformation accelerates at an unprecedented pace,
-
-
Nutrition Security for Planetary Health
CRC Press 出版Using the lens of nutrition security and equity for the living beings and living systems of the pla
-
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
Springer 出版This book introduces the reader to the most advanced topics of physical-layer security (PLS), crypt
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Energy Security, Transition, and Economic Growth
This book, Energy Security, Transition, and Economic Growth, provides a timely and comprehensive an
-
Transport Connectivity for Food Security in Africa
World Bank 出版Food insecurity is a persistent global problem affecting hundreds of millions of people each year.
-
Safety and Security of Power Installations
This book discusses current and essential issues regarding: ELECTRICAL RISKS PREVENTION, SAFETY OF
-
IoT Security using KVS Approach
In the realm of IoT security, the KVS Approach, a B cell concept, inspired by the human immune syst
-
Stress-Free Security
In a world guarded by passwords and firewalls, fear still finds its way into our hearts. What are w
-
American Grand Strategy and National Security
Palgrave M 出版This book is focused on explaining the grand strategic behavior of the United States from the Found
-
The High Representative of the Union for Foreign Affairs and Security Policy as a Legal Actor
The High Representative of the Union for Foreign Affairs and Security Policy conducts the EU's fore
-
Security Intelligence in the Age of AI
Artificial Intelligence (AI) has become a linchpin in modern security strategies, thanks to its abi
-
International Security Studies
Routledge 出版This textbook provides students with a comprehensive and accessible introduction to the subject of
-
Wireless Sensor Network Security
Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies
-
Security Vulnerabilities in AI pipeline
The intersection of artificial intelligence and healthcare has introduced promising applications in
-
IoT Security using VHDL
Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection ag
-
Information Security Management in Organizations
This book is written with the aim of providing a comprehensive guide for understanding and implemen
-
-
Security and Privacy in Cyber-Physical Systems and Smart Vehicles
Springer 出版This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conferenc
-
Information Security for CPAs
Hackers have many methods for breaking through the security surrounding a CPA firm's information sy
-
Team Diversity and Inclusion in Defence and Security
Springer 出版As a toolkit for the issues and challenges of diversity and inclusion in defense and security organ
-
Security in 21st Century Europe
Russia's 2022 invasion of Ukraine, the rise of populism and uncertainties about the future directio
-
Data and Applications Security and Privacy XXXIX
Springer 出版This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data a
-
-
International Security Studies
Routledge 出版This textbook provides students with a comprehensive and accessible introduction to the subject of
-
International Law and Security in Indo-Pacific
Routledge 出版This book uses an interdisciplinary approach to discuss international law and conflict in the Indo-
-
-
Salvation Security, Election, and Free Will
Perspectives on Grace, Eternal Life, and Balance Between Divine Sovereignty and Human Responsibilit
-
The Transfer of Negotiable Paper as Collateral Security, Being the Sharswood Prize Essay of the University of Pennsylvania for the Year 1886, and the Johnson Prize Essay for the Same Year
"The Transfer of Negotiable Paper as Collateral Security" by Lewis Lawrence Smith offers a detailed
-
-
-
Foundations and Practice of Security
Springer 出版This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Fou
-
-
-
Securing Women's Economic Security, Safety, and Freedom
Routledge 出版Universal Basic Income (UBI) as a policy measure for supporting economic security has attracted wor
-
Climate Security in the Indo-Pacific
Routledge 出版This book explores the intersection of climate change and security in the Indo-Pacific, from the So
-
Cloud-Free Smart Security
Sick of sending your living-room footage to who-knows-where? Cloud-Free Smart Security hands you a
-
-
Terahertz Channel Measurement, Modeling, and Security Properties
CRC Press 出版This book presents essential topics in terahertz communications, including channel measurement, mod
-
-
Achieve Comptia Security+ Sy0-701 Exam Success
Achieve CompTIA Security+ SY0-701 Exam Success is the most concise and complete Security+ study gui
-
-
-
Reengineering Cyber Security Process
de Gruyter 出版In today's rapidly evolving information technology landscape, cyber-attacks on company assets and I