-
Security Squad
Security Squad Aventures is an opportunity to explore the land of cybersecurity, cyberbullying, soc
-
-
Sex and Security
Marilyn likes sex and is delighted when she experiences a coup de foudre with a rich businessman wh
-
Intelligence Surveillance, Security Sector Reforms, Accountability Principles and National Security Challenges within European Union
This book discusses the various type of surveillance done by states on their citizens who live in f
-
-
Food Security
More than 25 percent of the world's population experiences moderate or severe levels of food insecu
-
Principles of Computer Security: Comptia Security+ and Beyond Lab Manual (Exam Sy0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains
-
Enhancing Livelihood Security Of Tribal Communities
This book depicts planning, execution and outcome of one such project executed under Tribal Sub Pla
-
The Security Hippie
Ingram 出版The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fraction
-
Security, Strategy, and Military Dynamics in South China Sea
Ingram 出版This volume brings together international experts to provide fresh perspectives on geopolitical con
-
Piracy and the Privatisation of Maritime Security
Palgrave M 出版In response to pirate attacks in the Western Indian Ocean, countries worldwide have increasingly au
-
Big Data Surveillance and Security Intelligence
Ingram 出版A look into the ramifications of the shift to "big data" by global security agencies. Intelligence
-
Cyber Security
Ingram 出版Want to Keep Your Devices and Networks Safe from Cyberattacks with Just a Few Easy Steps? Read on.T
-
The EU as a Post-Lisbon Regional Security Complex
Ingram 出版This book was written with the aim of analyzing the current nature of the EU as a regional security
-
Cyber Security
Ingram 出版Cyber Security Is Here To StayDo you often wonder how cyber security applies to your everyday life,
-
New Approaches to Improve the Security and QoS in MANET
Mobile Ad-hoc network is a set of wireless devices called wireless nodes, which dynamically connect
-
Iris Recognition in Enhanced Security
The preprocessingof irisimage includes fouraspects: localization, standardisation, sweetening, deno
-
National Security Mom
Ingram 出版Bennett has been featured in PBS' MAKERS, in Showtime's "Spymasters," in HBO's "Manhunt" as well as
-
ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security
Acpil 出版These proceedings represent the work of contributors to the 20th European Conference on Cyber Warfa
-
Security Market Operations
This book is glimpse of Security Market and Operations in India. Security Market is a component of
-
Enterprise Security Architecture
Ingram 出版Security is too important to be left in the hands of just one department or employee--it's a concer
-
Energiesicherheit in Deutschland am Beispiel des Energy Security Index nach Sovacool und Brown
Ingram 出版Studienarbeit aus dem Jahr 2018 im Fachbereich VWL - Umwelt繹konomie, Note: 1,7, Rheinische Friedric
-
Private Security
Ingram 出版There are few textbooks available that outline the foundation of security principles while reflecti
-
Environmental Security
Routledge 出版This textbook offers a student-friendly survey of the global politics of the environment through th
-
Security and Insecurity in Business History
Business history has so far examined the 'security' of enterprises primarily from the perspective o
-
Missions of Security
1632, Inc. 出版Neustatter's European Security Services is open for business, and business is . . . too good?With t
-
The Greatest Threat Iraq, Weapons of Mass Destruction, and the Crisis of Global Security
"The Greatest Threat is the ""brutally candid"" inside story of the West's failure to stop Iraqi di
-
Security Operations
Ingram 出版Security Operations: An Introduction to Planning and Conducting Private Security Details for High-R
-
Demystifying Internet of Things Security
Apress 出版Break down the misconceptions of the Internet of Things by examining the different security buildin
-
Determinants of Food Security. The Case of Chewaka Resettlement Scheme, Iluababor Zone
Ingram 出版Master's Thesis from the year 2016 in the subject Economy - Environment economics, grade: 4.00, Arb
-
Beginning Security with Microsoft Technologies
Apress 出版Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devi
-
The Post-colonial Security Dilemma
This book examines the development of Timor-Leste's foreign policy since achieving political indepe
-
Dalley and the Malayan Security Service, 1945-48
This book fills an important gap in the history and intelligence canvas of Singapore and Malaya imm
-
Reasons shewing the necessity of reducing the army, and proving that the navy of England is her only, and natural strength and security. With a new preface. The second edition.
The 18th century was a wealth of knowledge, exploration and rapidly growing technology and expandin
-
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition: 2021-2022 Supplement
-
Security, Culture and Human Rights in the Middle East and South Asia
Xlibris UK 出版European countries are dealing with an increasing number of refugees seeking asylum. Country eviden
-
Development and Security in Southeast Asia
Routledge 出版This title was first published in 2003. This three-volume set examines the relationship between gov
-
Cyber Security Sam Book 2, 2
Ingram 出版The Invisible Man is a mystery, in which a bright high school boy named Sam helps the FBI and Secre
-
Terrorism and National Security
Terrorism and National Security: Student Investigative File is a uniquely immersive educational exp
-
Information Security Management of University Libraries
Information systems in university libraries support the delivery of images, scholarly communication
-
The Laws on Aviation Security
As its title shows, the Book is about the historical development of the laws on aviation security b
-
Security & Reliability in Embedded Systems
This work is about a bold step towards bringing proven security to embedded systems. Most present d
-
Urban Agriculture and Households Food Security States
The main objective of this study was to identify the role of urban agriculture on households' food
-
The Unchangeableness of God’s Covenant, the Saints Security. a Sermon Occasioned by the Decease of the Rev. Mr. William Coombs, Who Departed This Life April the 1st, 1744. Preached at Limehouse, April
The 18th century was a wealth of knowledge, exploration and rapidly growing technology and expandin
-
Determinants of Livelihood Security among Small and Marginal Farmers
The study entitled "Determinants of livelihood security among Small and Marginal farmers in Betul d
-
Information Security Management
Information Security Management, Second Edition arms students with answers to the most critical que
-
Information Security Management
This book aims to identify the impact of information security management on the effectiveness of ap