-
Microsoft 365 Security and Compliance for Administrators
Packt 出版Master the art of configuring and securing Microsoft 365, emphasizing robust security and complianc
-
Computer Science based research articles on AR/VR, ML, DL, Cloud Security
Artificial Intelligence(AI) has changed the way of thinking in human beings. The AI subset i.e. Mac
-
Introduction to National Intelligence and Security Studies
This book is intended to aid demystify and explain the intelligence responses required for the emer
-
Machine Learning for Cyber Security
Springer 出版This book constitutes the referred proceedings of the 5th International Conference on Machine Learn
-
Economic security of the enterprise from the position of economic growth
The chosen topic is quite relevant, because the peculiarity of functioning of many enterprises in m
-
Lessons from Regional Responses to Security, Health and Environmental Challenges in Latin America
Ingram 出版What is the role of regional organizations in maintaining security across different parts of Latin
-
Fundamentals of Information Security Management System Engineering
Ingram 出版The monograph reveals the theoretical and methodological foundations of the engineering of the info
-
National Security in Ancient Times and Religious Texts
This book on national security is a valuable resource necessary for a diverse audience. It provides
-
Information Security
In today's digital landscape, computer hackers consistently breach corporate, military, and online
-
Sustainabilitiy in China. China’s food security over the last 30 years
Grin Verlag 出版Essay from the year 2022 in the subject Orientalism / Sinology - Chinese / China, grade: 1,7, Catho
-
Globalization and National Spiritual Security
Ingram 出版In the context of Uzbekistan's little-studied globalization, this book analyzes a variety of threat
-
A Basic Security Thought
This book sheds light on concerns and potential failings in the security industry, with the goal of
-
The African Peace and Security Architecture
Born of the transformation process from the Organisation of African Unity (OAU) to the African Unio
-
Challenging Maslow’s pyramid between security and self-actualization
The challenge of contemporaneity requires us to be adapted to the new realities, needs and critical
-
Politics and Security. Concepts and Practical Issues in Contemporary World
Grin Verlag 出版Scientific Study from the year 2023 in the subject Politics - Basics and General, grade: 1.3, langu
-
Present and Emerging Threats to National Security in Digital and Cyber Space
Ingram 出版The rapid and extensive shift in technology, especially in the digital cyberspace domain is creatin
-
Foundations and Practice of Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Symposium on Foundations a
-
Security-Driven Software Development
Packt 出版Trace security requirements through each development phase, mitigating multiple-layer attacks with
-
Regulatory Compliance in Financial Cyber Security
In the modern digital world, where there is money, there are cyberattackers. According to IBM, the
-
Cloud Security Success Stories
In today's rapidly advancing digital landscape, the adoption of cloud technology has become a neces
-
Citizen Security
National security is associated with such a degree of violence that even the media must minimise or
-
Cloud Security
CRC Press 出版This comprehensive work surveys the challenges, the best practices in the industry, and the latest
-
The Secrets of Currency Watermarks and Advanced Security Features
The Secrets of Currency Watermarks and Advanced Security Features is a comprehensive exploration of
-
Community Governance and Security Management in Nigeria
The book offers a detailed analysis of governing and safeguarding communities in Nigeria's complex
-
The Challenges of Nuclear Security
Palgrave M 出版This Open Access volume assembles experts from the United States and India to examine six issues es
-
Security Challenges and Access to Education in Central Mali
This study explores the security challenges affecting the education system in the Segou region of M
-
Security Architecture for Hybrid Cloud
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to
-
Legends of the Security Services Industry
CRC Press 出版Legends of the Security Services Industry: Profiles in Leadership presents the unique stories of fi
-
Isc2 Certified Cloud Security Professional (Ccsp) Exam Guide
Cloud security is a rapidly evolving field, demanding professionals with specialized knowledge and
-
Circular Economy Applications for Water Security
CRC Press 出版In arid and semi-arid regions, where water demand exceeds water availability, water security is bec
-
Cyber Security for Small Business
The world may be fast approaching the perfect storm, with the intersection of two major global tren
-
Assessment of Food Security and Food Sovereignty in Bolivia
From a rights-based approach, understanding that the State is the main guarantor for the realisatio
-
Romanian Power System - European Energy Security Generator
The vulnerability of critical power infrastructures generates several risks and threats to them, th
-
Security in Design Phase of SDLC for Web Applications
This book describes three approaches for the security of web applications related to the current tr
-
Water Security at Risk in Australia, China and Japan
Peter Crawford is well known in Australia and internationally for his leadership in reforming gover
-
NIST Cloud Security
Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge
-
Taking The First Step To Financial Security
Ingram 出版Welcome to 'Taking the first step to Financial Security. A Primer on Financial Literacy.' In this b
-
Taking The First Step To Financial Security
Ingram 出版Welcome to 'Taking the first step to Financial Security. A Primer on Financial Literacy.' In this b
-
Software Quality as a Foundation for Security
Springer 出版This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2
-
Optimizing the Use of Farm Waste and Non-Farm Waste to Increase Productivity and Food Security
Traditional farming systems have dominated the agricultural sector for the past few centuries. Howe
-
Security Frameworks in Contemporary Electronic Government
Global change and advancing technology have transformed the government sector with the use of infor
-
Cryptographic Security Solutions for the Internet of Things
The Internet of Things is a technological revolution that represents the future of computing and co
-
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional
-
Artificial Intelligence and Security Challenges in Emerging Networks
The recent rise of emerging networking technologies such as social networks, content centric networ
-
-
ICT Systems Security and Privacy Protection
Springer 出版This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on I
-
Law Enforcement Bodies and Economic Security of the State
The monograph is devoted to the important and topical topic of the problems of ensuring economic se
-
Justice and Public Security in Brazil
The purpose of this book is to provide the reader with a link between fundamental themes of justice