-
Glocalized Security
Ingram 出版What forces drive violent conflicts, and whose interests are protected by military involvement? In
-
Glocalized Security
Ingram 出版What forces drive violent conflicts, and whose interests are protected by military involvement? In
-
資訊安全概論與實務(第四版)(含ITS Network Security網路安全管理核心能力國際認證模擬試題)
碁峰資訊 出版*國內資訊安全經典/暢銷第四版「資訊安全」是一門綜合科學,在學習資訊安全領域上,涵蓋了管理面、策略面、技術面等方向,需要從基礎理論的建立延伸到解決實務應用問題,從數位邊界、管理制度到掌握駭客攻擊手法
-
Applied Cryptography and Network Security Workshops
Springer 出版This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held
-
The Security Abolition Manifesto
As the supreme concept of bourgeois society, security underpins all existing structures of power.Se
-
Peace and Security
Lulu.com 出版This Book will provide a Compilation of Biblical, Geo-Political and Astronomical Research that Asce
-
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
Packt 出版Become a Certified Cloud Security Professional and open new avenues for growth in your careerPurcha
-
Security Psychology
The book is written on a topic that is relevant to our time. Safety has always been a concern of pe
-
Testing the Security of Real-World Electronic Voting Systems
Voting is the process through which a democratic society determines its government. Therefore, voti
-
The Security Consultant’s Guide to Home Security
Michael A. Silva is an independent security consultant with over 50 years of experience in advising
-
Cyber Space and Outer Space Security
This book delves into cutting-edge research, encompassing both theoretical and experimental aspects
-
Managing Contemporary Security Challenges in Nigeria
Palgrave M 出版This book covers a wide range of security issues in Nigeria, including insurgency, terrorism, herde
-
Public Perceptions of Artificial Intelligence for Homeland Security
To evaluate public perception of the benefits and risks of U.S. Department of Homeland Security use
-
Network Security
Lulu.com 出版In an era where the digital realm is the cornerstone of modern connectivity, the importance of netw
-
Hardware Security
Springer 出版This book provides a look into the future of hardware and microelectronics security, with an emphas
-
Developing a Security Training Program
CRC Press 出版Developing a Security Training Program focuses on how to establish a comprehensive training program
-
Information Security and Privacy
Springer 出版This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, h
-
Offensive and Defensive Cyber Security Strategies
CRC Press 出版The aim of this book is to explore the definitions and fundamentals of offensive security versus de
-
Offensive and Defensive Cyber Security Strategies
CRC Press 出版The aim of this book is to explore the definitions and fundamentals of offensive security versus de
-
The National Security Constitution in the Twenty-First Century
A deeply researched, fully updated edition of The National Security Constitution that explores the
-
Cyber Security and Business Analysis
Ingram 出版The imperative of cyber security has never been more pronounced and organisations must remain proac
-
Improving the Security of Soft Targets and Crowded Places
Ingram 出版Attacks on soft targets and crowded places are a significant challenge. The U.S. Department of Home
-
Spring Security - Fourth Edition
Packt 出版Leverage the power of Spring Security 6 to protect your modern Java applications from hackersKey Fe
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
Data and Applications Security and Privacy XXXVIII
Springer 出版This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applica
-
Security and Privacy in Communication Networks
Springer 出版This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th Internat
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection
Ingram 出版High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents st
-
Recent Advances in Computational Intelligence and Cyber Security
Ingram 出版In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computatio
-
Global Peace and Security
Intechopen 出版This book, Global Peace and Security, is a collection of reviewed and relevant research chapters of
-
The Politics of Cyber-Security
Routledge 出版By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offer
-
Customizable Security
Network security is a complex beast, and a one-size-fits-all solution rarely exists. "Customizable
-
API Security for White Hat Hackers
Packt 出版Become an API security professional and safeguard your applications against threats with this compr
-
Unequal Security
Routledge 出版Bringing together disciplines such as political science, criminology, sociology, and anthropology a
-
Extended Security Management
This book is very beneficial to all European and global decision-makers who are decision makers on
-
Leveraging New Paradigms for Enhanced Mobile Network Security
The mobile landscape is evolving, and traditional security methods struggle to keep pace. New parad
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
Sybex 出版CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information S
-
Mobile Internet Security
Springer 出版This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile I
-
Enhancing Cryptographic Systems Security against SCAs
Cryptography is essential for securing data from unauthorized access, yet Side-Channel Attacks (SCA
-
Socio-Economic Analysis of Household Livelihood Security Problems
The study provides a comprehensive overview of livelihood patterns and socio-economic dynamics in I
-
The Challenge of Extending Social Security in Burundi
In everyday life, man is always confronted with survival problems that disrupt his assets, and has
-
Asia-Pacific Regional Security Assessment 2024
Routledge 出版The Asia-Pacific Regional Security Assessment (APRSA) examines key regional security policies and c
-
Food Security for All
"Beyond Hunger" calls for a future where food security is not a privilege, but a cornerstone of Can
-
Trust & Security
The South African Police Service (SAPS) faces a challenge: building trust with the communities it s
-
Dynamics Shaping Global Health Security in The Next Decade
Nimble Books 出版In a world grappling with the long shadow of a pandemic and on the brink of unprecedented environme
-
Global Peace and Security
The world is changing so fast with variable aspects and people would abruptly face the whirlpool of
-
Sustainable Agriculture for Food Security
Sustainable Agriculture for Food Security: A Global Perspective takes an analytical approach to iss