-
Awareness Level of Security breaches for Remote Workers
This book examined remote employees' security breach awareness levels and provides a detailed insig
-
Cyber Security Applications for Industry 4.0
CRC Press 出版Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various dis
-
Preparing for Hybrid Threats to Security
Routledge 出版This book examines hybrid threats within the broader context of a security crisis in Europe.As geop
-
Cryptographic and Information Security Approaches for Images and Videos
CRC Press 出版This book presents essential principles, technical information, and expert insights on multimedia s
-
Systems for ensuring national information security
The monograph is intended for specialists engaged in ensuring national and information security of
-
Security Issues for Wireless Sensor Networks
CRC Press 出版This book covers a comprehensive discussion on the state of the art in security technologies for wi
-
Security and Cryptography for Networks
Springer 出版The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Confe
-
Security and Cryptography for Networks
Springer 出版The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Confe
-
-
Public Perceptions of Artificial Intelligence for Homeland Security
To evaluate public perception of the benefits and risks of U.S. Department of Homeland Security use
-
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection
Ingram 出版High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents st
-
API Security for White Hat Hackers
Packt 出版Become an API security professional and safeguard your applications against threats with this compr
-
Leveraging New Paradigms for Enhanced Mobile Network Security
The mobile landscape is evolving, and traditional security methods struggle to keep pace. New parad
-
Food Security for All
"Beyond Hunger" calls for a future where food security is not a privilege, but a cornerstone of Can
-
Sustainable Agriculture for Food Security
Sustainable Agriculture for Food Security: A Global Perspective takes an analytical approach to iss
-
Information Security for Small and Midsized Businesses
Small and midsized businesses (SMBs) are outgunned by cybercriminal and activist organizations focu
-
Security Framework for The Internet of Things Applications
Ingram 出版The text highlights a comprehensive survey that focuses on all security aspects and challenges faci
-
Ultimate Linux Network Security for Enterprises
"Level Up Your Security Skills with Linux Expertise!"Book DescriptionThe Ultimate Linux Network Sec
-
The Search for Security in the Pacific 1901-1914
First published in 1976, The Search for Security in the Pacific 1901-1914 is the first volume in a
-
Security for Cloud Native Applications
Security for cloud-native applications is an overview of cloud-native application's characteristics
-
-
Microsoft 365 Security and Compliance for Administrators
Packt 出版Master the art of configuring and securing Microsoft 365, emphasizing robust security and complianc
-
Machine Learning for Cyber Security
Springer 出版This book constitutes the referred proceedings of the 5th International Conference on Machine Learn
-
Security Architecture for Hybrid Cloud
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to
-
Circular Economy Applications for Water Security
CRC Press 出版In arid and semi-arid regions, where water demand exceeds water availability, water security is bec
-
Cyber Security for Small Business
The world may be fast approaching the perfect storm, with the intersection of two major global tren
-
Security in Design Phase of SDLC for Web Applications
This book describes three approaches for the security of web applications related to the current tr
-
Software Quality as a Foundation for Security
Springer 出版This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2
-
Cryptographic Security Solutions for the Internet of Things
The Internet of Things is a technological revolution that represents the future of computing and co
-
-
-
-
-
-
-
-
-
-
Decision and Game Theory for Security
Springer 出版This book constitutes the refereed proceedings of the 14th International Conference on Decision and
-
Innovative Security Solutions for Information Technology and Communications
Springer 出版This book constitutes revised selected papers from the thoroughly refereed conference proceedings o
-
Privacy and Security for Mobile Crowdsourcing
This book is a concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and counterme
-
-
Providing Food Security for All
Ingram 出版This volume is an in-depth study of global food security, focused at the household level. Filled wi
-
Automotive Security Analyzer for Exploitability Risks
Ingram 出版Our lives depend on automotive cybersecurity, protecting us inside and near vehicles. If vehicles g
-
A Librarian's Guide to ISO Standards for Information Governance, Privacy, and Security
Ingram 出版This book was written to demystify critical standards related to information security, records mana
-
Network And Security Fundamentals For Ethical Hackers
Ingram 出版���� Unlock Your Cybersecurity Mastery!Are you ready to master the art
-
Disruption, Ideation and Innovation for Defence and Security
Springer 出版This book explores types of disruptions in defence and security, ways to assess disruptions trigger
-
Pulses for Food and Nutritional Security of India
Springer 出版This book provides an in-depth analysis of India's pulses sector in terms of production, prices, ma