-
Security in Operating System
Security in operating systems is paramount for protecting data, ensuring privacy, and maintaining s
-
A Treatise on the Police of the Metropolis Containing a Detail of the Various Crimes and Misdemeanors by which Public and Private Property and Security are, at Present, Injured and Endangered
Ingram 出版A Treatise on the Police of the Metropolis Containing a Detail of the Various Crimes and Misdemeano
-
AWS Certified Security - Specialty Certification Guide (SCS-C01)
DESCRIPTION AWS, a leading cloud platform, demands effective security measures. This certification
-
Philosophical Analysis of Personal Information Security
The monograph is devoted to the study of philosophical aspects of personal protection in the global
-
The Challenge of Global Migration - Human Rights, Security and Refugees
Xlibris UK 出版This is a comprehensive study that examines the sources of refugee flows, in particular as they rel
-
Information Security - Risk Management Framework
Ingram 出版In today's digital age, where data preservation is the cornerstone of security and communications,
-
Global Security in an Age of Crisis
Ingram 出版This book presents a range of analyses across the security spectrum, bringing a deep understanding
-
Enhancing Security in Fuzzy Networks Through Efficient Domination
Let G(V, E) be a finite simple connected graph of order m with vertex set V and edge set E. A domin
-
Spiritual Security
OS Pub 出版"Spiritual Security: Faith and Cybersecurity Concerns" explores the intersection of spirituality an
-
Genetically Modified Crops and Food Security
Routledge 出版This book reviews a wide-range of genetically modified (GM) crops, to understand how they are produ
-
Regional Security in South Asia and the Gulf
Routledge 出版As we move towards a world without superpowers, the dynamics within and between regions are of grow
-
Routledge Handbook of Maritime Security
Routledge 出版This handbook offers a critical and substantial analysis of maritime security and documents the mos
-
Why Does National Security Matter
The memoir is about Asha's frontline experiences in national security. The author presents a multid
-
Intelligent Border Security Intrusion Detection robot using IoT
Spying literally means to watch from a distance. In this paper, the work of designing and implement
-
Patterns in Border Security
Routledge 出版This book compares the construction of cross-border security regimes across five regions of the wor
-
Facial Recognition and Other Security Tech
World Book 出版The discoveries and inventions of today are poised to change the way you live in the near future. C
-
Security and Cryptography for Networks
Springer 出版The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Confe
-
Computer Security - Esorics 2024
Springer 出版This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Sym
-
Security and Cryptography for Networks
Springer 出版The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Confe
-
Network Security Fundamentals-Part I
The book provides a comprehensive overview of network security fundamentals, essential for anyone l
-
ECCWS 2024- Proceedings of the 23rd European Conference on Cyber Warfare and Security
Ingram 出版These proceedings represent the work of contributors to the 23rd European Conference on Cyber Warfa
-
Securing endpoints to improve IT security
Independentl 出版"Securing endpoints to improve IT security" introduces you to topics like effective unified endpoin
-
Sing Sing Follies (A Maximum-Security Comedy)
"I can't wait for you to read this. I hope it thrills and confounds and inspires you just like it d
-
-
Food Security with Productive Inclusion in the Semi-arid Region of Alagoas
"Nutritional and Productive Food Security in Rural Communities of the Ipanema Territory of Alagoas"
-
-
-
Security Guard
The Security Guard Passbook(R) prepares you for your test by allowing you to take practice exams in
-
Security in Vehicular Adhoc Networks
This book is written to explain the concept of VANETs, its different characteristics and the challe
-
Computer Safety, Reliability, and Security. Safecomp 2024 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with the 43rd Internatio
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the refereed proceedings of the 43rd International Conference on Computer Saf
-
From Cultural Deprivation to Cultural Security
Routledge 出版This important book considers how youth of color and other marginalized youth experience socio-cult
-
Cryptography and Information Security
Mdpi AG 出版This Special Issue on cryptography and information security presents a diverse range of contributio
-
Terrabyte Security
A sleepy little town, Aspen Ridge, nestled in the Colorado Rockies, is experiencing major growing p
-
Sociological diagnostics of information security
In modern conditions of introduction and functioning of automated control systems (ACS) the analysi
-
Security Officers and Supervisors
CRC Press 出版Security Officers and Supervisors: 150 Things You Should Know presents an array of relevant topics,
-
Moral Damage in Social Security Benefits
Ingram 出版This bibliographical research paper deals with moral damages in social security benefits by analysi
-
Public (In)security in Brazil
The need to build a Citizen Police arose in political contexts where government and police authorit
-
Contemporary Understanding of Security and Its Contexts
Ingram 出版Volatility is one of the most characteristic features of contemporary security.The level of threats
-
DK Super Planet Farming and Food Security
Ingram 出版Modern, authentic topic books which improve literacy and are mapped to the IB PYP, Cambridge Primar
-
National Security and Peace Building
"The Nigerian Military, National Security, and Peacebuilding: An Analytical Study of Military and C
-
Climate change and food security
Ingram 出版The debate around food production reflects the concern of various sectors about the need for new an
-
Cryptography & information Security
The field of Cryptography and Information Security is essential for protecting data in our increasi
-
Applied Cryptography and Network Security Workshops
Springer 出版This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held
-
Empowering the Un Security Council
Empowering the UN Security Council: Reforms to Address Modern Threats provides an in-depth analysis
-
Quantum Technology in Defence & Security
"Quantum Technology in Defence & Security" propels readers into the cutting-edge realm where quantu
-
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, man
-
August - A Tombs Security + Devil’s Rose MC Crossover
Cleo Browne 出版Ana Taylor, ex-pat Kiwi and stand-in leader of the Bartashev Bratva thrives on the chaos in her wor