-
Torture in the National Security Imagination
University o 出版Reassessing the role of torture in the context of police violence, mass incarceration, and racial c
-
Resourcing the National Security Enterprise
Ingram 出版Few military officers can ascend to the ranks of senior leadership without eventually being assigne
-
Applications and Techniques in Information Security
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Applications
-
Cross-Disciplinary Perspectives on Homeland and Civil Security; A Research-Based Introduction, Revised Second Edition
Now twenty years after 9/11, this well established and uniquely composed textbook, in its revised s
-
Security and Privacy in New Computing Environments
Springer 出版This book constitutes the refereed proceedings of the 4thInternational Conference on Security and P
-
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Ingram 出版The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses in
-
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Ingram 出版The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses in
-
-
-
Cloud Security Handbook
Packt 出版A comprehensive reference guide to securing the basic building blocks of cloud services, with actua
-
Big Data and Security
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Big Data an
-
Fixing Social Security
Princeton 出版How Social Security has shaped American politics--and why it faces insolvency Since its establishme
-
The Security Arena in Africa
Ingram 出版The labels 'state fragility' and 'civil war' suggest that security within several African countries
-
Women, Peace and Security and International Law
Ingram 出版In 2000, the UN Security Council adopted the ground-breaking Resolution 1325 on Women, Peace and Se
-
Hardware Supply Chain Security
Springer 出版This book presents a new threat modelling approach that specifically targets the hardware supply ch
-
False Sense of Security
Ingram 出版This book illustrates why sex offender residency restrictions are ineffective in preventing childre
-
False Sense of Security
This book illustrates why sex offender residency restrictions are ineffective in preventing childre
-
Reform and Development of the Old-Age Security System in China
China is experiencing the most comprehensive and profound institutional change in the history of wo
-
Comptia Security+ Practice Tests
Ingram 出版Prepare for the Security+ certification exam confidently and quickly CompTIA Security+ Practice Tes
-
Advances in Communications, Computing, Networks and Security Volume 9
Ingram 出版This book is the ninth in a series presenting research papers arising from MSc/MRes research projec
-
Advances in Communications, Computing, Networks and Security Volume 11
Ingram 出版This book is the eleventh in a series presenting research papers arising from MSc/MRes research pro
-
-
Advances in Communications, Computing, Networks and Security Volume 10
Ingram 出版This book is the tenth in a series presenting research papers arising from MSc/MRes research projec
-
Advances in Communications, Computing, Networks and Security Volume 8
Ingram 出版This book is the eighth in a series presenting research papers arising from MSc/MRes research proje
-
Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Lulu.com 出版This book is the thirteenth in a series presenting research papers arising from MSc/MRes research p
-
Advances in Communications, Computing, Electronics, Networks, Robotics and Security Volume 12
Lulu.com 出版This book is the twelfth in a series presenting research papers arising from MSc/MRes research proj
-
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)
Lulu.com 出版The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses in
-
-
Security in the 21st Century
Routledge 出版This exceptional volume examines international security issues by way of case studies of the confli
-
Frontiers in Cyber Security
Springer 出版This volume constitutes the proceedings of the 4th International Conference on Frontiers in Cyber S
-
One Welfare Animal Health and Welfare, Food Security and Sustainability
Ingram 出版This thought-provoking book explores the link between animals, people and their social and physical
-
Ubiquitous Security
Springer 出版This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitou
-
The Republic, Secularism and Security
Springer 出版This book analyses French cultural policies in the face of what the French government perceives as
-
Introduction to Machine Learning with Applications in Information Security
Ingram 出版Introduction to Machine Learning with Applications in Information Security, Second Edition provides
-
Attaining Food Security
Gyan Books 出版The Title 'Attaining Food Security: Experiments of Asian Nations written by Alka Parikh' was publis
-
Climate Change And Treats To Human Security
Gyan Books 出版The Title 'Climate Change And Treats To Human Security written by Dr. Narottam Gan' was published i
-
Cloud Computing Security
Cloud services have revolutionized computing in the modern world. In an increasingly networked ecos
-
Security. Cooperation. Governance.
Ingram 出版Historically, national borders have evolved in ways that serve the interests of central states in s
-
Articulating Security
Ingram 出版We live in a world of mobile security threats and endemic structural injustice, but the United Nati
-
Parliaments’ Contributions to Security Sector Governance/Reform and the Sustainable Development Goals
The United Nation's Sustainable Development Goal (SDG) 16 calls for the establishment of peaceful,
-
Introduction to Cyber-Security
Digital information and data processing, storage and transmission are already at the core of most m
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Packt 出版Remediate active attacks to reduce risk to the organization by investigating, hunting, and respondi
-
-
Foreign Policy and Security Strategy
Foreign Policy and Security Strategy collects works by the late Professor Martin Wight (1913-1972),
-
Identifying Security Logics in the Eu Policy Discourse
Springer 出版Introduction1. Securitization as the work of framing. Towards a new framework of analysis 1.1. Secu
-
Identifying Security Logics in the Eu Policy Discourse
Springer 出版Introduction1. Securitization as the work of framing. Towards a new framework of analysis 1.1. Secu
-
Beginners Guide To Ethical Hacking And Cyber Security
This book is written only for educational purposes and is a comprehensive guide to ethical hacking
-
Drinking Water Security in Rural India
Springer 出版This book highlights the multi-pronged strategy for achieving sustainable rural domestic water supp