-
The Security & Privacy Acceptance Framework (SPAF)
Ingram 出版Cybersecurity and Privacy (S&P) unlock the full potential of computing. Use of encryption, authenti
-
Information Technology for Peace and Security
Technological and scientific progress, especially the rapid development in information technology (
-
Terrorism and National Security
Ingram 出版Terrorism and National Security: Student Investigative File is a uniquely immersive educational exp
-
Ethics, Security, and the War Machine
Ingram 出版If pacifists are correct in thinking that war is always unjust, then it follows that we ought to el
-
A Practical Introduction to Security and Risk Management
Ingram 出版A Practical Introduction to Security and Risk Management is the first textbook to combine both secu
-
The Ultimate Guide to Home Security
Ingram 出版Nothing in the world is more important than the safety and security of your loved ones at home and
-
Cyber Warfare, Security and Space Computing
Springer 出版This book constitutes selected papers from the Second International Conference on Cyber Warfare, Se
-
Improving the Security and Privacy of Edge Devices Through Blockchain
Ingram 出版The world of IoT existence is wholly being built on the communication and the interconnectionof thi
-
A Cryptographic Model for Cyber Security Applications
Ingram 出版The word Cryptography originated from the Greek Word "Secret writing. Cryp-tography is basically th
-
E-Voting Through Biometric Security System
Ingram 出版Assistant Professor, Dept: of Electronics and Communication Engineering, College of Engineering Per
-
Security Assurance by Efficient Password Based Authentication
Ingram 出版At present, identity theft is one of the most prevalent security threats.Authentication is an inevi
-
Security Mechanisms and Privacy Issues In Cloud Storage System
Ingram 出版The demand for cloud computing increases day by day and this also increases the needfor Security fo
-
Enhancing Security for Internet of Vehicles
Ingram 出版Internet of Vehicles (IoV) is an emerging concept in Intelligent Transportation Systems (ITS)to enh
-
Enhancing Your Cloud Security with a CNAPP Solution
Packt 出版Implement the entire CNAPP lifecycle from designing, planning, adopting, deploying, and operational
-
Proliferation of Small Arms and Light Weapons and National Security in Nigeria. Recipes for Disarmament
Ingram 出版Research Paper (undergraduate) from the year 2022 in the subject Organisation and administration -
-
Russia National Security and Defence Policy Handbook Volume 1 Strategic Information and Basic Laws
Russia National Security and Defence Policy Handbook Volume 1 Strategic Information and Basic Laws
-
-
Security and Privacy in Communication Networks
Springer 出版This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm
-
-
-
Rural Roads to Security; America’s Third Struggle for Freedom
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
-
State Secrecy and Security
Routledge 出版In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy t
-
International Social Security Law
Ingram 出版Although a sophisticated body of international social security law is active and growing, a number
-
Civil Society, Care Labour, and the Women, Peace and Security Agenda
Routledge 出版This book proposes that work on the Women, Peace and Security agenda undertaken by civil society ac
-
Good Governance and Civil-Security Relations
Routledge 出版Developing the traditional civil-military relations approach to include security actors, the book c
-
China’s Energy Security and Relations with Petrostates
Routledge 出版This book examines the development of bilateral energy relations between China and the two oil-rich
-
Protecting National Security
Routledge 出版This book contends that modern concerns surrounding the UK State's investigation of communications
-
Religion, Public Health and Human Security in Nigeria
Routledge 出版This book critically examines the intersection of religion, public health and human security in Nig
-
Southern and Postcolonial Perspectives on Policing, Security and Social Order
Ingram 出版Postcolonial legacies continue to impact upon the Global South and this edited collection examines
-
Machine Learning Security Principles
Packt 出版Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obt
-
Managing Security Services in Heterogenous Networks
Ingram 出版A heterogeneous network is a network which connects computers and other devices with different oper
-
Stabilization, Safety, and Security of Distributed Systems
Springer 出版This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety,
-
The Water, Energy, and Food Security Nexus in Asia and the Pacific
Springer 出版This open access book considers the water, energy, food (WEF) nexus in the Pacific region. The regi
-
Information Security Applications
Springer 出版This book constitutes the revised selected papers from the 23rd International Conference on Informa
-
Japan’s Security Policy
Routledge 出版This book analyses Japan's security policy after the Cold War and engages with the question of whet
-
Hardware Security Primitives
Springer 出版Introduction.- Hardware Security Primitives and their Applications.- Racetrack PUF.- TERO PUF.- Dir
-
Peace, Safety and Security: African Perspectives
The universal quest for peace, safety, and security aptly captured in The 2030 Agenda for Sustainab
-
Fair Play for Cuba Committee. Hearings Before the Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws of the Committee on the Judiciary, United
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
The role of women in crime prevention. The security issue problem in the case of Alamata Town
Ingram 出版Bachelor Thesis from the year 2022 in the subject Sociology - Law and Delinquency, Wollo University
-
Certified Information Security Manager Exam Prep Guide - Second Edition
Packt 出版Master information security fundamentals with comprehensive explanations of concepts.Purchase of th
-
The Impact of Climate Variables on Food Western Rajasthan Security. A Case Study in Jodhpur District
Ingram 出版Case Study from the year 2022 in the subject Geography / Earth Science - Meteorology, Aeronomy, Cli
-
A Time-state-preference Model of Security Valuation
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Azure Security for Critical Workloads
Apress 出版This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This
-
African Security in the Anthropocene
Springer 出版Much has been written on security in Africa--its democratic deficit, poor civil-military relations,
-
Interlocking Subversion in Government Departments. Hearing Before the Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws of the Committee on t
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
The Service of Security and Information
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Israel: National Security and Securitization
Springer 出版This book is the first comprehensive, book-length analysis of Israel and securitization processes.