-
Decolonising Conflicts, Security, Peace, Gender, Environment and Development in the Anthropocene
Springer 出版In this book 25 authors from the Global South (19) and the Global North (6) address conflicts, secu
-
Homeland Security
This textbook--written by experts in the field--delivers a comprehensive, systematic introduction t
-
Enterprise Level Security 2
Ingram 出版Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' fir
-
Trust, Privacy and Security in Digital Business
Springer 出版This book constitutes the refereed proceedings of the 17th International Conference on Trust, Priva
-
Security and Trust Management
Springer 出版This book constitutes the proceedings of the 16th International Workshop on Security and Trust Mana
-
Enhancement of Data Storage Security in Public Cloud Environment
Ingram 出版Cloud is completely the internet dependent technology where client data is stored and maintained in
-
Compression and Security of Biometric Images
Ingram 出版In present scenario biometric systems are widely used in various applications, but the recent biome
-
Security in Electronic Payment System
Ingram 出版Electronic Commerce industry is exploding at a fast pace. One of the key aspects of electronic comm
-
City & Security
Ingram 出版Communities and citizens' rights in security co-production addresses the complexity of the city and
-
Gender and environmental security
Ingram 出版Research Paper (postgraduate) from the year 2018 in the subject Gender Studies, grade: 100, course:
-
Security Management of Radioactive Material in Use and Storage and of Associated Facilities
Ingram 出版Security management for radioactive material in use, storage and associated facilities includes the
-
Mapping Security in the Pacific
Routledge 出版This book examines questions about the changing nature of security and insecurity in Pacific Island
-
Security With Kali Linux
Lulu.com 出版Security-Enhanced Linux (SELinux) is a security module specifically made for the Linux kernel, whic
-
The ”essence” of Network Security: An End-To-End Panorama
Springer 出版Introduction to Network Security Technologies.- A Systematic Review of Digital, Cloud and IoT Foren
-
Android Apps Security
Apress 出版Gain the information you need to design secure, useful, high-performing apps that expose end-users
-
Private Militaries and the Security Industry in Civil Wars
Since the 1990s, private military and security companies (PMSCs) have intervened in civil wars arou
-
Piracy and the Privatisation of Maritime Security
Palgrave M 出版In response to pirate attacks in the Western Indian Ocean, countries worldwide have increasingly au
-
Advances in Information and Computer Security
Springer 出版This book constitutes the refereed proceedings of the 15th International Workshop on Security, IWSE
-
Tourism, Terrorism and Security
Ingram 出版International tourism has been a target for terrorist agents seeking to cause political instability
-
A Criminology of Policing and Security Frontiers
Ingram 出版Policing and security provision are subjects central to criminology. Yet there are newer and neglec
-
British Security Policy
Routledge 出版This book, first published in 1991, examines Britain's defence and foreign policy of the 1980s, and
-
Security and Intelligence in a Changing World
Routledge 出版This book, first published in 1991, examines the changes to security and intelligence agencies envi
-
Savage Security
There's no escaping a Dire Wolf on the hunt... Dire Wolf Deus likes his quiet, regimented life. He
-
Security and Privacy in Cyberspace
Springer 出版This book highlights the literature and the practical aspects to understand cybersecurity and priva
-
The Effect of Food and Energy Security on Political Stability
Grin Verlag 出版Master's Thesis from the year 2020 in the subject Business economics - Economic Policy, grade: 10,
-
Applied Cryptography and Network Security
Springer 出版This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th Intern
-
Food Security, Poverty and Nutrition Policy Analysis
Ingram 出版Food Security, Poverty and Nutrition Policy Analysis: Statistical Methods and Applications, Third E
-
Contemporary French Security Policy in Africa
Palgrave M 出版Despite efforts to normalize its post-colonial relationship and the downsizing of its permanent mil
-
Red Hat and It Security
Apress 出版Use Red Hat's security tools to establish a set of security strategies that work together to help p
-
Climate Change and Arctic Security
Ingram 出版This book assesses the construction of security in the context of climate change, with a focus on t
-
Contemporary Security Studies
Ingram 出版With unrivalled coverage of a wide range of issues - from terrorism, inter-state conflict and nucle
-
Cyber Security Education
Routledge 出版This book investigates the goals and policy aspects of cyber security education in the light of esc
-
AWS Certified Security - Specialty Exam Guide
Get to grips with the fundamentals of cloud security and prepare for the AWS Security Specialty exa
-
Security and Privacy Trends in the Industrial Internet of Things
Springer 出版This book, written by leaders in the protection field of critical infrastructures, provides an exte
-
The Diplomacy of D矇tenteTheDiplomacy of D矇tenteCooperative Security Policies from Helmut S
Routledge 出版This book investigates the underlying reasons for the longevity of d矇tente and its impact on East-W
-
Human Aspects of Information Security and Assurance
Springer 出版This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human As
-
Towards the Internet of ThingsArchitectures, Security, and Applications
Springer 出版Chapter1: The IoT Landscape.- Chapter2: IoT Architecture.- Chapter3: IoT Security.- Chapter4: Some
-
Many Agent Games in Socio-Economic Systems: Corruption, Inspection, Coalition Building, Network Growth, Security
Springer 出版There has been an increase in attention toward systems involving large numbers of small players, gi
-
Sustainability in Food Consumption and Food Security
Mdpi AG 出版The transformation of food chains towards sustainability in food consumption and food security is a
-
Love in the Security Directorate
Ingram 出版She can take him or she can take himThe ruthless Security Directorate controls your birth, educatio
-
Europeanisation and the Transformation of Eu Security Policy
Routledge 出版The aim of this study is to examine the extent to which the end of the Cold War led to Europeanisat
-
Political Culture, Change, and Security Policy in Nigeria
Routledge 出版Demonstrating how political culture facilitates or distorts political preferences and political out
-
Security Culture in Times of War
Miles-Verlag 出版This book uses a comparative case study approach to examine how security cultures change under the
-
Peace, Security and Defence Cooperation in Post-Brexit EuropeRisks and Opportunities
Springer 出版Highlighting the challenges and prospects of European security cooperation, this volume examines th
-
Czech Security DilemmaRussia as a Friend or Enemy?
This volume examines the future directions of Czech international policy through an interdisciplina
-
Information Security Education. Education in Proactive Information Security12th Ifip Wg 11.8 World Conference, Wise 12, Lisbon, Portugal, June 25-27, 2019, Proceedings
Springer 出版This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Informa
-
Cism Certified Information Security Manager Study Guide
Ingram 出版Sharpen your information security skills and grab an invaluable new credential with this unbeatable
-
Security of Biochip Cyberphysical Systems
Springer 出版This book provides readers with a valuable guide to understanding security and the interplay of com