-
Perception of Security
In broad terms, the perception of security reflects the differences between the rulers and the rule
-
AI-Driven Cyber Security
Ingram 出版Welcome to the forefront of modern cyber security - a landscape shaped and transformed by the relen
-
Foundations of National Security Theory
National Security Theory posits that the international strategic environment is harsh, uncertain, i
-
Zero Trust Security Demystified
Gain cybersecurity confidence - unlock the secrets to a foolproof defense system for your digital a
-
Fixing Social Security
Princeton 出版How Social Security has shaped American politics--and why it faces insolvency Since its establishme
-
The Un Security Council and the Maintenance of Peace in a Changing World
Ingram 出版How can the UN Security Council contribute to the maintenance of international peace and security i
-
The Un Security Council and the Maintenance of Peace in a Changing World
How can the UN Security Council contribute to the maintenance of international peace and security i
-
The Impact of Herdsmen-Farmers Conflict on Food Security in Benue State, Nigeria
Grin Verlag 出版Research Paper (postgraduate) from the year 2023 in the subject Politics - Region: Africa, grade: A
-
Zero Trust Security Demystified
Gain cybersecurity confidence - unlock the secrets to a foolproof defense system for your digital a
-
Evolution of the Collective Security System
This book presents the execution of international policies normally used by States which, as has be
-
Transatlantic Trade and Investment Partnership. TTIP's role in terms of politics, security, and defense
Grin Verlag 出版Seminar paper from the year 2023 in the subject Economics - International Economic Relations, grade
-
Design of IT security policies
Computer systems, computer equipment, information generated by organisations, companies, educationa
-
Security Risk Assessment of Critical Energy Infrastructures
Energy security and implicitly the regional energy architecture composed of critical energy infrast
-
Social Security 101, 2nd Edition
Learn the ins and outs of the social security system in this accessible, easy-to-navigate guide wit
-
Role of Ballistic and Cruise Missiles in International Security
The book attempts to understand the myriad roles of ballistic and cruise missiles in international
-
The Democratic Republic of Congo’s political, economic, and security quagmire
Seminar paper from the year 2023 in the subject Politics - General and Theories of International Po
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
Ubiquitous Security
Springer 出版This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in E
-
Information Security and Cryptology - Icisc 2023
Springer 出版This book constitutes the refereed proceedings of the 26th International Conference on Information
-
Information Security and Cryptology - Icisc 2023
Springer 出版This book constitutes the refereed proceedings of the 26th International Conference on Information
-
Data Science and Information Security
Springer 出版This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Int
-
Security Without Obscurity
Ingram 出版Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptograp
-
Health Security Intelligence
Routledge 出版Health Security Intelligence introduces readers to the world of health security, to threats like CO
-
Critical Security Studies in the Digital Age
Palgrave M 出版This book demonstrates that the disciplinary boundaries present within international relations appr
-
The Eu, Irish Defence Forces and Contemporary Security
Palgrave M 出版This book aids any researcher, policymakers and military personnel in researching small states and
-
Information Security and Cryptology
Springer 出版The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internatio
-
Food Security and Biodiversity
Blurb 出版In a world grappling with the dual imperatives of feeding a growing global population and safeguard
-
Information Security and Cryptology
Springer 出版The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internatio
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
CompTIA Security+ SY0-701 Certification Guide - Third Edition
Packt 出版100% coverage of the latest CompTIA Security+ SY0-701 exam objectives ensures you study what you ne
-
Identifying and Mitigating the Security Risks of Generative AI
Ingram 出版Every major technical invention resurfaces the dual-use dilemma - the new technology has the potent
-
Security in Smart Home Networks
Springer 出版This book presents the security and privacy challenges of the smart home following the logic of "te
-
Security After the Unthinkable
Ingram 出版This book builds a theoretical perspective for explaining what security remains after the security
-
Mastering Cloud Security Posture Management (CSPM)
Packt 出版Strengthen your security posture in all aspects of CSPM technology, from security infrastructure de
-
Computer Security. Esorics 2023 International Workshops
Springer 出版This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven Intern
-
Computer Security. Esorics 2023 International Workshops
Springer 出版This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven Intern
-
Plural Policing, Security and the Covid Crisis
This book critically examines how countries across Europe have dealt with the COVID crisis from a p
-
Security After the Unthinkable
This book builds a theoretical perspective for explaining what security remains after the security
-
Generative AI Security
Springer 出版This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It pr
-
International Security
This work can be used as a basic reference book. In addition, this book is one of the most comprehe
-
Cyber Security - The Lost Decade
The author (JC Gaillard) has been involved with information security matters for over 20 years and
-
The Australia-Japan Defence and Security Relationship 1945-2021
Routledge 出版McDermott examines the origins, development and prospects for the Australia and Japan Defence and S
-
Physical Security Assessment Handbook
CRC Press 出版Physical Security Assessment Handbook: An Insider's Guide to Securing a Business, Second Edition ha
-
Desalination and Water Security
Routledge 出版This book provides a holistic view of desalination, highlighting the important role this technology
-
National Security Surveillance in Southern Africa
Bloomsbury 出版In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveilla
-
Computer Security, Networks and ICT
Ingram 出版In this book we find computer topics of great interest to the general population such as the danger
-
The Whole Process of E-Commerce Security Management System
This book systematically and integrally introduces the new security management theories and