-
-
-
-
China's Self-Conception and the Security Environment in East Asia
China's economic, technological, political, scientific, and military rise has significant implicati
-
-
Cloud Native Data Security with Oauth
With the growth of cloud native applications, developers increasingly rely on APIs to make everythi
-
-
-
-
-
Network Security Management in Heterogeneous Networks
Mdpi AG 出版Heterogeneous networks, as a critical component of modern communication technology, have experience
-
-
-
-
Multidimensional Threats and Regional Responses to Caribbean Security
This book assesses the prevalence and intensity of intersecting security threats on the small islan
-
Security of the China Pakistan Economic Corridor (CPEC)
Routledge 出版This book analyses the strategic and economic significance of the China-Pakistan Economic Corridor,
-
-
-
-
National Security Constitutionalism in the Commonwealth Five Eyes States
This book examines the constitutional treatment of national security in the UK, Canada, Australia a
-
Christmas Security
They're dodging a killer And finding each other Biophysicist Dr. Priscilla Pell fears for her lif
-
Financial Cryptography and Data Security
Springer 出版The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Confere
-
Intelligence, Security and the State
The modern-day UK intelligence and security community is the product of over a century of reviews g
-
-
-
-
-
-
-
-
-
-
-
-
-
Pathways to African Food Security
Routledge 出版This book examines Africa's current food system and future challenges for food security over the ne
-
-
-
-
Social Security, Medicare & Government Pensions
Nolo 出版Your complete guide to Social Security retirement, Medicare or Medicaid benefits, and other federal
-
-
Canada Among Nations 2023: Twenty-First Century National Security
Palgrave M 出版Canada Among Nations has been published by faculty from Carleton University's Norman Paterson Schoo
-
-
Foreign Aid’s Effects on Development and Human Security in Kenya
Using Kenya as a case study, this book demonstrates the effects and limitations of foreign aid on d
-
AI-Driven Network Security and Privacy
Ingram 出版The security technology of new information technologies in scenarios such as smart life, smart citi
-
-
Cultural Security in Contemporary China and Mongolia
Cultural Security in Contemporary China and Mongolia applies the term "cultural security" not exclu
-