-
Information Security
Springer 出版The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Confere
-
Casino Security and Surveillance
Casinos are complex businesses that face a range of security challenges. From preventing fraud to m
-
Casino Security and Surveillance
Casinos are complex businesses that face a range of security challenges. From preventing fraud to m
-
Space Law, Satellite Constellation-Based Internet & Cyber security
The expansion of internet availability through satellite constellations has extensive implications.
-
Information Security
Springer 出版The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Confere
-
Cyber security tools
Cyber security tools is a comprehensive guide that delves into various tools and techniques used in
-
National Security In Nigeria
Traditionally, national security is defined as building up the defence, security manpower, and amaz
-
Handbook of Homeland Security
In today's interconnected world, extremism and terrorism poses a persistent threat, transcending bo
-
Institutional Roots of India's Security Policy
In recent years, India has asserted its desire not simply to be a balancing power but to become a l
-
Security, Privacy, and Trust in WBANs and E-Healthcare
CRC Press 出版Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could
-
Home Computer Security On the Cheap
Lulu.com 出版Keep your family safe from pornography, malware and other online threats. Every day we browse hundr
-
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
CRC Press 出版Although recent advances in technology have made life easier for individuals, societies, and states
-
Contribution to the study on maintaining food security
Eradicating food insecurity remains the overriding goal of any state seeking to improve the well-be
-
Neurotechnology in National Security and Defense
Ingram 出版Research and applications of neurotechnology are expanding at a rapid pace, and are fostering. publ
-
Security and Privacy in Communication Networks
Springer 出版This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th Internat
-
Routledge Readings on Security and Governance in Northeastern India
Ingram 出版Routledge Readings on Security and Governance in Northeastern India: Resource Conflicts, Militarisa
-
IT Governance and Information Security
Ingram 出版IT governance seems to be one of the best strategies to optimize IT assets in an economic context d
-
Asia-Pacific Defense and Security Outlook
Routledge 出版The book focuses on the main security threats, defence industry, arms trade, defence policies and m
-
Security in International Climate Policy
de Gruyter 出版The impacts of climate change are increasingly felt worldwide, affecting every country regardless o
-
Food Security Issue in Countries Based on Small-Scale Farming
Small-scale farming constitutes up to 80% of the world's farmers, mainly in developing countries, a
-
Human-Centered Security
Whether you're a designer, researcher, product manager, or engineer, you need to be concerned about
-
Strong Security Governance through Integration and Automation
Ingram 出版This book provides step by step directions for organizations to adopt a security and compliance rel
-
Security Studies in a New Era of Maritime Competition
Routledge 出版How do two conventionally powerful, nuclear armed, but commercially oriented great powers, reliant
-
Housing Security
I believe that housing is a human right. In the United States, a very wealthy country, there is no
-
Power Flow and Security Analysis in Electrical Transmission System
Ingram 出版The power system engineers dire need of extraordinary methods to optimally analyze, monitor and con
-
Leveraging Cyber Threats and National Security
The more sophisticated and wide-ranging cyber-attacks present new threats to governments, critical
-
Safety and Security of Critical Transport Infrastructure
The present book SAFETY AND SECURITY OF CRITICAL TRANSPORT INFRASTRUCTURE debates current issues an
-
Cryptology and Network Security
Springer 出版This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conf
-
Achieving Global Food Security
Ingram 出版This book examines the current food security challenges in the small states with a focus on the Car
-
Intellectual Security Strategy to Confront Terrorism and Extremism
Ingram 出版This study deals with the topic of "Intellectual Security Strategy to Confront Extremism, Violence
-
Enhancing Information Security
Since the start of Covid in late 2019, a lot of organizations and businesses have made big moves in
-
Breastfeeding and food and nutrition security
These are the results of a research project that aimed to analyse and discuss the relationship betw
-
Detecting Security Vulnerability in Web Applications
In this research work, we presented a new XSS defense strategy framework based on soft-computing ap
-
Becoming an Independent Security Consultant - Second Edition
Ingram 出版Many people who are retiring from law enforcement, the military, or careers in private security wou
-
The Role of Newspapers in Combating Nigeria’s Security Issues
Ingram 出版The study, "The Role of Newspapers in Combating Nigeria's Security Issues", was set to analyse the
-
Certified Information Systems Security Professional (CISSP) Exam Guide
Packt 出版Master the skills to safeguard information assets in a dynamic digital landscape and achieve your C
-
-
Food Security in the Caribbean
Palgrave M 出版Food security is a pressing concern in the Caribbean. Caribbean countries produce and export crops
-
Offensive Security Using Python
Packt 出版Unlock Python's hacking potential and discover the art of exploiting vulnerabilities in the world o
-
AWS Security Cookbook - Second Edition
Packt 出版Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and
-
AI-based Static Application Security Testing Guide
Code smells are usually ignored as they are neither a bug, nor a vulnerability. Quality engineers a
-
An Integrated Approach to Home Security and Safety Systems
CRC Press 出版This book provides an integrated solution for security and safety in the home, covering both assist
-
Facets of Security in the United Arab Emirates
Routledge 出版The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies
-
The Security Leader’s Communication Playbook
CRC Press 出版This book is for cybersecurity leaders across all industries and organizations. It is intended to b
-
Advances in Cyber Security and Intelligent Analytics
CRC Press 出版The book highlights the challenges faced by emerging paradigms and presents the recent developments
-
An Interdisciplinary Approach to Modern Network Security
CRC Press 出版An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and tren
-
Privacy and Security Challenges in Cloud Computing
CRC Press 出版This reference text discusses various security techniques and challenges for cloud data protection
-
Security Analytics
CRC Press 出版This book discusses a range of topics from information security to cryptography, mobile application