-
Information Security for Small and Midsized Businesses
Small and midsized businesses (SMBs) are outgunned by cybercriminal and activist organizations focu
-
Migration, Development and Urban Food Security
Over the last decade, two issues have risen to the top of the international development agenda: Foo
-
-
Critical Infrastructure Security
Packt 出版Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infras
-
Language and Security
Monograph focuses on the analysis of securitizing speech acts produced by major actors in Slovak pu
-
Security Framework for The Internet of Things Applications
Ingram 出版The text highlights a comprehensive survey that focuses on all security aspects and challenges faci
-
Security Team Operating System
Have you felt the pressure of leading an information security program? The board of directors and e
-
The Agrarian Question and Food Security
The book QUEST?O AGR?RIA E SEGURAN?A ALIMENTAR discusses the reverberations of the insertion of cap
-
Blockchain-based Cyber Security
CRC Press 出版The book focuses on a paradigm of blockchain technology that addresses cyber security. The challeng
-
Ultimate Linux Network Security for Enterprises
"Level Up Your Security Skills with Linux Expertise!"Book DescriptionThe Ultimate Linux Network Sec
-
Security Challenges with Blockchain
Securing the Chain: Navigating the Future of Blockchain with ConfidenceBook DescriptionIn "Security
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This book constitutes the refereed proceedings of the 5th International Conference on Machine Learn
-
Quality Assessment and Security in Industrial Internet of Things
CRC Press 出版The book highlights authentication and trust evaluation models in the Industrial Internet of Things
-
Cryptography and Embedded Systems Security
Springer 出版This textbook provides an all-in-one approach for learning about hardware security of cryptographic
-
Mastering AWS Security - Second Edition
Packt 出版Explore the depths of AWS security and learn how to design, implement, and maintain a secure cloud
-
Homeland and territorial security with AI
This book explores the innovative concept of a knowledge cartridge dedicated to internal and territ
-
Foundations and Practice of Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Symposium on Foundations a
-
Key Security Concepts that all CISOs Should Know-Cyber Guardians
Ebookit.com 出版Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital Real
-
Faithful (Sentinel Security London Book 1) Large Print Edition
Ingram 出版Guard Your Heart - Trust No OneUntil his last mission, British military medic Luke McLaren kept his
-
Genetics and the Politics of Security
Routledge 出版Presenting a sociological perspective on the contemporary gaze on the body of the suspect, this boo
-
Methodology to Improve Control Plane Security in Sdn Environments
This book unveils a blueprint for safeguarding the very backbone of modern communication networks.
-
Risks and Security of Internet and Systems
Springer 出版This book constitutes the revised selected papers of the 18th International Conference on Risks and
-
Information Security Management System ISMS
This book is a comprehensive guide to the Information Security Management System (ISMS) based on IS
-
Social Security In 30 Minutes, Volume 1
Ingram 出版Revised second edition including updated benefits! Worried about Social Security retirement benefit
-
Social Security In 30 Minutes, Volume 1
Ingram 出版Revised second edition including updated benefits! Worried about Social Security retirement benefit
-
Proceedings of the 19th International Conference on Cyber Warfare and Security
Acpil 出版These proceedings represent the work of contributors to the 19th International Conference on Cyber
-
Social Security In 30 Minutes, Volume 2
Revised second edition! Millions of Americans have disabilities. Social Security SSDI and SSI benef
-
Information Security Theory and Practice
Springer 出版This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition
Packt 出版Become an AWS certified security specialist, strengthen your cloud defenses, and unlock advanced te
-
Analysis of security perceptions
Ingram 出版The aim of this study was to analyze the perception of electrical safety among workers in the city
-
Psychologists in public security
Ingram 出版This book brings together the results of research aimed at investigating the inclusion of psycholog
-
The discourse of security in the democratic rule of law
The aim of this research is to demonstrate the relationship between the discourse of security and t
-
Water Quality, Water Security and Risk Assessment
Mdpi AG 出版Water is very important for the existence of living things. Several studies have found that clean w
-
The Search for Security in the Pacific 1901-1914
First published in 1976, The Search for Security in the Pacific 1901-1914 is the first volume in a
-
The Gendered and Colonial Lives of Gurkhas in Private Security
This book explores the ways in which affect, colonial histories, and militarism organise global sec
-
Aviation Security
Bibliogov 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Analysis of food security situation and its impacts on Household
In this book we discussed the food insecurity situation, causes and challenges in Pakistan during 2
-
The Cost of Asset Security and Organizational Performance
The growth of violence in Brazil's states is visible to all. In view of this, electricity distribut
-
China’s national security strategy
Ingram 出版The end of the Cold War ushered in a new international order, which influenced the creation of new
-
Security over Cloud Platforms
Ingram 出版This book examines the critical aspect of security assurance within Docker containers deployed over
-
Cote D’ivoire And The Challenges Facing Private Security Companies
The private security sector in Ivorian society is booming. While the security, economic, social and
-
Security for Cloud Native Applications
Security for cloud-native applications is an overview of cloud-native application's characteristics
-
Fabricating Homeland Security
Homeland security is rarely just a matter of the homeland; it involves the circulation and multipli
-
Cyber Security
There has been an increase in cybercrime and a search for government or private company assets that
-
Security after Christendom
Ingram 出版We live in the wealthiest and most heavily defended world in history, so why do we feel so insecure
-
Security Monitoring with Wazuh
Packt 出版Learn how to set up zero-cost security automation, incident response, file integrity monitoring sys
-
Using Modeling and Simulation to Advance Effects-Based Security Forces Planning
Ingram 出版This report summarizes research on how top-down risk analysis models could help inform the staffing
-
Asian Security in the Age of Globalization
Routledge 出版This book examines the security challenges and opportunities that the nation-states of Asia confron