-
Stabilization, Safety, and Security of Distributed Systems
Springer 出版This book constitutes the refereed proceedings of the 23rd International Symposium on Stabilization
-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th Inte
-
Transforming Security
Springer 出版This book analyses the collective security system as it now stands, focusing on strategic and norma
-
Demography and National Security
Political scientists, demographers, legal scholars, and historians have come together in this volum
-
Information Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the 26th Australasian Conference on Information S
-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th Inte
-
電子書 電腦資訊
【電子書】資安這條路:領航新手的 Web Security 指南,以自建漏洞環境學習網站安全(iT邦幫忙鐵人賽系列書)
博碩文化 出版本書內容改編自第 12 屆 iT 邦幫忙鐵人賽 Security 組佳作網路系列文章 ──《資安這條路 ─ 以自建漏洞環境學習資訊安全》。這是一本專為資安新手寫的教戰指南,以鮮明的圖文、表格讓新
-
Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, h
-
Israel’s National Security, the Arab Position, and Its Complicated Relations with the United States
Ingram 出版The author argues that Israel, with help from the United States, should deal with Iran's nuclear pr
-
Turkey and the EU in an Energy Security Society
This book explores Turkey-EU relations in the context of natural gas. Utilising the English School
-
The City of Kiev (Keyed Sketch) and the Bolshevik Machine Building Factory in Kiev (Manpower, Description, Security, Transportation, Manpower; Machine Tool Factory Manpower, Security, Description, Wor
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Traveler’s Guide to Personal Security
Gone are the days when the most a traveler had to worry about was communicating with the cab driver
-
Cases and Materials on Social Security Law and Practice
Ingram 出版This book presents a selected collection of writings in prose by one of the greatest poets in the E
-
The Seaman’s Opinion of a Standing Army in England in Opposition to a Fleet at Sea the Best Security of This Kingdom
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Provable and Practical Security
Springer 出版This book constitutes the refereed proceedings of the 15th International Conference on Provable Sec
-
Information Security Applications
Springer 出版This book constitutes the revised selected papers from the 22nd International Conference on Informa
-
Cow-pox Inoculation No Security Against Small-pox Infection. To Which Are Added, the Modes of Treating the Beastly New Diseases Produced From Cow Pox ... With the Author’s Certain, Experienced, and Su
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
The Positive Government Security Life Assurance Company, Limited, Incorporateed Pursuant to Acts of Parliament [microform]
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Cow-pox Inoculation No Security Against Small-pox Infection. To Which Are Added, the Modes of Treating the Beastly New Diseases Produced From Cow Pox ... With the Author’s Certain, Experienced, and Su
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
A Treatise on the Police of London; Containing a Detail of the Various Crimes and Misdemeanors by Which Public and Private Property and Security Are, at Present, Injured and Endangered
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
Financial Cryptography and Data Security
Springer 出版This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th Inte
-
Financial Cryptography and Data Security
Springer 出版This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th Inte
-
Amount Assured $11,000,000.00, Surplus Security $714,935.75 [microform]
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Port Information on Odessa, Zhdanov, and Novorossiysk (Description and Layout, Security, Piers, Quays, Cranage, Terminal Facilities, Cargo Handling Efficiency, Dry Docks, Harbor Craft, Hydrographic Da
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Deglobalization and International Security
*This book is in the Rapid Communications in Conflict and Security (RCCS) Series (General Editor: G
-
Minutes of Some Experiments to Ascertain the Permanent Security of Vaccination, Against Exposure to the Small-pox; to Which Are Prefixed Some Remarks on Mr. Goldson’s Pamphlet. With an Appendix Contai
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
A Treatise on the Police of London; Containing a Detail of the Various Crimes and Misdemeanors by Which Public and Private Property and Security Are, at Present, Injured and Endangered
This work has been selected by scholars as being culturally important and is part of the knowledge
-
Reflections on the Cow-pox, Illustrated by Cases to Prove It an Absolute Security Against the Small Pox; Addressed to the Public in a Letter to Dr. Jenner ..
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
The Next Era in Hardware Security
Springer 出版This book provides a comprehensive coverage of hardware security concepts, derived from the unique
-
The Morals of a People the Best Security of Good Government
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
Mastering Defensive Security
Packt 出版An immersive learning experience enhanced with technical, hands-on labs to understand the concepts,
-
Increased Farmer Income, Improved Nutritional Security, and More Sustainable Food and Farm Systems in India by 2030
As the Food and Agriculture Organization (FAO) of the United Nations Representativein India and as
-
Challenging the United Nations Peace and Security Agenda in Africa
Palgrave M 出版This book concerns the United Nations' peacemaking, peacekeeping, peace-building, and post-conflict
-
Applications of Cryptography and Network Security
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With th
-
Resource and Security Management in Electronic Communications and Networks
Electronic communications and networks play a major part in management of industries and businesses
-
Cyber Security in Business and Management
The security of digital databases has become increasingly important in the context of modern busine
-
Computer and Information Security
This comprehensive book provides a global overview of computer and information security. It offers
-
Railway Engineering and Security
Ever since the first ever train was used to carry coal from a mine in Shropshire (England, 1600), t
-
Information Security: Principles and New Concepts (Volume IV)
This is the era of information. We can read up about everything on the internet. The data is freely
-
Information Security: Principles and New Concepts (Volume II)
This is the era of information. We can read up about everything on the internet. The data is freely
-
Cloud Computing: Security and Management
Cloud computing is an internet-based computing mechanism which uses virtual databases for sharing a
-
Security Management & Community Policing
Ingram 出版SYNOPSIS Insecurity has become so worrisome and a source of concern in the society. The precarious
-
Information Security: Principles and New Concepts (Volume III)
This is the era of information. We can read up about everything on the internet. The data is freely
-
Information Security Management
Information security has gained significance over the last decade. It is playing a crucial role in
-
Data Security and Cryptography
Data security is the practice of protecting digital data from unauthorized access and unwanted acti
-
Communication Network Systems and Security
Communication network systems refer to the collection of various transmission networks, data termin
-
Information Security Handbook
The practice of preventing unauthorized access, disruption, disclosure and destruction of informati