-
EU-Korea Security Relations
Routledge 出版This book provides an original examination of current European Union (EU)-Republic of Korea (ROK) s
-
-
National Security Surveillance in Southern Africa
Zed Books 出版In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveilla
-
Strategic Disarmament, Verification and National Security
Routledge 出版Originally published in 1977, the purpose of this book was to analyse the relationship between the
-
Nuclear Non-Proliferation and Global Security
Routledge 出版The nuclear non-proliferation treaty had recently undergone its third formal review by its signator
-
Information Security and Cryptology - Icisc 2021
Springer 出版This book constitutes selected papers from the 24th International Conference on Information Securit
-
Bibliography on Soviet Intelligence and Security Services
Routledge 出版This annotated bibliography is a valuable tool for research and teaching on Soviet intelligence and
-
Terrorism and National Security
Ingram 出版Terrorism and National Security: Student Investigative File is a uniquely immersive educational exp
-
Selective Security in the War on Drugs
Ingram 出版This book offers an analysis of security practices within the scope of the "war on drugs," through
-
Security as Code
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cl
-
Information Security Breaches
Ingram 出版This pocket guide provides a general discussion of what information security breaches are, how they
-
It Induction and Information Security Awareness
Ingram 出版Where your information security is concerned, prevention is better than cure. If you want to tackle
-
Security in the Digital World
"Love the fact that it jumped in with 10 top tips for security, a great opening to the book... Exce
-
How Cyber Security Can Protect Your Business
Ingram 出版Summary Explains in easy-to-understand terms what executives and senior managers need to know and
-
Managing Information Security Breaches
The book provides a general discussion and education about information security breaches, how they
-
Security and Resilience of Cyber Physical Systems
Ingram 出版In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour
-
Information Security a Practical Guide
Ingram 出版How do you engage with your peers when they think you're there to stop them working? Corporate info
-
The Art of Cyber Security
Ingram 出版This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber securi
-
Assessing Information Security
The activities of the cyber criminal are both deliberate and hostile, and they can be compared to m
-
Selling Information Security to the Board
Ingram 出版Information technology plays a fundamental role in the operations of any modern business. While the
-
Web Application Security Is a Stack
The web application stack - a growing threat vector Understand the threat and learn how to defend y
-
Supply Chain Security
Contemporary supply chains operate under the pressure of customer requirements, increasing price co
-
Database Security
Database Security: Problems and Solutions describes and demonstrates how to resolve database securi
-
Network Security and Cryptography
Ingram 出版This new edition introduces the basic concepts in computer networks, blockchain, and the latest tre
-
Peace and Security in the Western Balkans
Routledge 出版This book outlines the main security threats, actors and processes in the Western Balkans following
-
Environmental Security and India
This book examines environmental issues through the lens of security studies and presents a compreh
-
Justice (Sentinel Security Book 3)
Mahaba Books 出版A Man on a mission. A Woman who walks alone. Two paths. One destiny.John (Snake) Smith, the newest
-
Dilemmas of Human Rights and Security in Asia
Xlibris UK 出版Liberal democratic states have been dealing with major refugee flows. The migration of large number
-
Contextualizing Security
Security studies, also known as international security studies, is an academic subfield within the
-
Contextualizing Security
Ingram 出版Security studies, also known as international security studies, is an academic subfield within the
-
Socio-Technical Aspects in Security
Springer 出版This book constitutes revised selected papers from the refereed conference proceedings of the 11th
-
Data and Applications Security and Privacy XXXVI
Springer 出版This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data a
-
Understanding Maritime Security
A concise introduction to the history and evolution of security at sea. Whether it is pirates, smug
-
Mastering Windows Security and Hardening - Second Edition
Packt 出版A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022
-
Social Security Law in Poland
Ingram 出版Derived from the renowned multi-volume International Encyclopaedia of Laws, this book describes the
-
Shifting Security and Power Constellations in Central Asia and the Caucasus
Ingram 出版This book provides an up-to-date overview of contemporary Central Eurasian politics, identifies key
-
Security Incidents & Response Against Cyber Attacks
Springer 出版This book provides use case scenarios of machine learning, artificial intelligence, and real-time d
-
Computing Science, Communication and Security
Springer 出版This book constitutes revised selected papers of the Third International Conference on Computing Sc
-
Human Aspects of Information Security and Assurance
Springer 出版This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human As
-
Emerging Security Technologies and Eu Governance
Routledge 出版This book examines the European governance of emerging security technologies. The emergence of tech
-
Security and Stability in the New Space Age
Routledge 出版This book examines the drivers behind great power security competition in space to determine whethe
-
The Rhine and European Security in the Long Nineteenth Century
Routledge 出版Throughout history rivers have always been a source of life and of conflict. This book investigates
-
Practical Core Software Security
As long as humans write software, the key to successful software security is making the software de
-
Humanitarianism, Human Rights, and Security
Routledge 出版Examining the relationship between humanitarianism, human rights, and security in the governance of
-
ASEAN Maritime Security
Springer 出版This book covers various strategic issues around maritime security in terms of how Indonesia has so
-
Pakistan, Regional Security and Conflict Resolution
Routledge 出版This book explains how colonial legacies and the postcolonial state of Pakistan negatively influenc
-
-
Towards a Sustainable Arctic: International Security, Climate Change and Green Shipping
Ingram 出版The Arctic's environment, economics and politics are changing rapidly, and the conflicting interest