-
-
-
-
-
-
-
Hearings Relating to H.R. 10390, H.R. 10391, and H.R. 10681, Amending the Internal Security act of 1950. Hearings, Ninetieth Congress, First Session
Palala Press 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Hearings Regarding Private Security Guards
Palala Press 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
-
-
Health Security Act of 1993
Palala Press 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Bundle: Ethical Hacking and Countermeasures: Attack Phases, 2nd + Mindtap Information Security, 1 Term (6 Months) Printed Access Card
Cengage 出版Students save money when purchasing bundled products. This bundle contains Ethical Hacking and Coun
-
-
Security Discourse in the Middle East
Ingram 出版More than three years ago, revolts broke out in several Arab countries against their authoritarian
-
Computer Security and Encryption
Ingram 出版Because of the rapid growth of cybercrime, cryptography and system security may be the fastest grow
-
Sicherheit Und Differenz in Historischer Perspektive - Security and Difference in Historical Perspective
Ingram 出版The contributions in this book examine historical and current conceptions of security, i.e. discour
-
Your Security Guide
Ingram 出版The objective of this book is to acquaint you with the Security Field. It's purpose is to act as a
-
Accountability in Eu Security and Defence
Ingram 出版Currently, some 2,500 civilian experts work across Europe, Africa, and Asia in ten ongoing civilian
-
Routledge Handbook of Media, Conflict and Security
Routledge 出版This Handbook links the growing body of media and conflict research with the field of security stud
-
A Global Security System
Ingram 出版Resting on a convincing body of evidence that violence is not a necessary component of conflict amo
-
Cyber Crime, Security and Digital Intelligence
Routledge 出版Cyber crime is one of the main threats to the digital economy. From insider threats to complex dist
-
Regional Security Structures in Asia
Routledge 出版Kapor argues that explanations of international relations in Asia in the post-Second World War peri
-
Security and Data Reliability in Cooperative Wireless Networks
Ingram 出版Following a detailed overview of cooperative communications and the physical layer security, this b
-
Security Opportunities in Nano Devices and Emerging Technologies
Ingram 出版The research community lacks both the capability to explain the effectiveness of existing technique
-
Security and Privacy in Internet of Things (Iots)
Ingram 出版The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortu
-
Regulating the Security Industry
Routledge 出版It is widely acknowledged that the size of the security industry has increased in virtually every c
-
Hcispp Healthcare Information Security and Privacy Practitioner All-In-One Exam Guide
McGraw-Hill 出版Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher f
-
Financial Cryptography and Data Security
Springer 出版This book constitutes the thoroughly refereed post-conference proceedings of the 24th International
-
Cache Security on ARMSide-channel Attack and Defense: Introduction to Side-channel on ARM Platform
Eliva Press 出版ARM platform has been in both research and industry focus for recent years. Based on its energy-eff
-
The Difference That Gender Makes to International Peace and Security
Routledge 出版This book showcases the relevance of a gender perspective for explaining contemporary issues of pea
-
Enterprise Networking, Security, and Automation Companion Guide (Ccnav7)
Ingram 出版Enterprise Networking, Security, and Automation Companion Guide is the official supplemental textbo
-
Nordic Societal Security
Routledge 出版This book compares and contrasts publicly espoused security concepts in the Nordic region, and expl
-
Mastering Windows Security and HardeningSecure and protect your Windows environment from i
Packt 出版Enhance Windows security and protect your systems and servers from various cyber attacksKey Feature
-
Statistical Methods in Computer Security
Ingram 出版Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistica
-
Ukraine’s Foreign and Security Policy 1991-2000
Routledge 出版This book analyses Ukraine's relations with each of its neighbours in the 1990s and the degree to w
-
Food Security and Environmental Quality in the Developing World
Ingram 出版Can developing countries meet the food requirements of their growing populations without jeopardizi
-
Energy, Governance and Security in Thailand and Myanmar (Burma)
Routledge 出版Across the world states are seeking out new and secure supplies of energy but this search is manife
-
Cyber Security Management
Routledge 出版Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Le
-
-
-
The Security Culture Playbook
Wiley 出版Mitigate human risk and bake security into your organization's culture from top to bottom with insi
-
Old Europe, New Security
Routledge 出版Many of the US criticisms of Western European reluctance to engage in the 2004 war in Iraq stem fro
-
Wireless Security Architecture
Wiley 出版Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT se
-
Spring Boot情境式網站開發指南|使用Spring Data JPA、Spring Security、Spring Web Flow
碁峰資訊 出版使用全Spring框架建構新一代企業級網站! 本書一次蒐錄所有技能! 如何讓網站使用者有更佳的體驗一直是歷久不衰的話題。使用Spring Web Flow框架讓使用者在預先定義好的情境裡,逐步被引導
-
電子書 電腦資訊
【電子書】Spring Boot情境式網站開發指南:使用Spring Data JPA、Spring Security、Spring Web Flow
碁峰資訊 出版使用全Spring框架建構新一代企業級網站! 本書一次蒐錄所有技能! 如何讓網站使用者有更佳的體驗一直是歷久不衰的話題。使用Spring Web Flow框架讓使用者在預先定義好的情境裡,逐步被引導
-
Mastering Azure Security - Second Edition
Packt 出版Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries an
-
Security and Conservation
Ingram 出版An exploration of the scale, practical reality, and future implications of the growing integration
-
MCA Microsoft Certified Associate Azure Security Engineer Study Guide
Ingram 出版Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sy