-
Cloud Computing Security
CRC Press 出版This handbook offers a comprehensive overview of cloud computing security technology and implementa
-
Comptia Security+ Certification Bundle, Fourth Edition (Exam Sy0-601)
McGraw-Hill 出版This money-saving collection covers every objective for the CompTIA Security+ exam and contains exc
-
Women’s Perspectives on Human Security
Ohio Unive 出版Violent conflict, climate change, and poverty present distinct threats to women worldwide. Importan
-
Defending Assessment Security in a Digital World
Routledge 出版Defending Assessment Security in a Digital World explores the phenomenon of e-cheating and identifi
-
Introduction to Homeland Security
Butterworth 出版Written by renowned experts, Introduction to Homeland Security, Sixth Edition, informs users about
-
Comptia Security+ Study Guide with Online Labs
Sybex 出版Expert Security+ SY0-501 exam preparation, endorsed by CompTIA, Now with 25 Online Lab Modules The
-
Agricultural Technology Adoption and Food Security
This book contains the research methods and outcomes of my research work in the area of Agricultura
-
Transnational Security Cooperation in the Mediterranean
Palgrave M 出版This volume draws together academics and think tank experts to explore the revised European Neighbo
-
Pakistan Security Dilemma
Ingram 出版Pakistan's security issues have been spiraled to a 'Security Dilemma'. Pakistan's core issue of Jam
-
An Introduction to Operational Security Risk Management
Ingram 出版This introductory book provides a sound foundation for operational security risk practitioners as w
-
An Introduction to Operational Security Risk Management
Ingram 出版This introductory book provides a sound foundation for operational security risk practitioners as w
-
Linking Mine Action and SSR Through Human Security
Ingram 出版Security sector reform (SSR) and mine action share a strong common conceptual basis, which draws fr
-
Water, Food Security and Human Dignity
This book highlights the key role of water for food security, globally and for different groups. Cl
-
Geopolitics and the Diplomacy of the European Energy Security
European leaders, economists and scholars are voicing their concerns regarding the fact that most E
-
Principles of Security and Trust
Ingram 出版This book constitutes the proceedings of the 7th International Conference on Principles of Security
-
Cyber Security
Ingram 出版This open access book constitutes the refereed proceedings of the 15th International Annual Confere
-
Principles of Security and Trust
Ingram 出版This open access book constitutes the proceedings of the 8th International Conference on Principles
-
Principles of Security and Trust
Ingram 出版This open access book constitutes the proceedings of the 8th International Conference on Principles
-
Security in Computer and Information Sciences
Ingram 出版This open access book constitutes the thoroughly refereed proceedings of the First International IS
-
Security in an Interconnected World
Ingram 出版This open access book follows the idea that security policy must be based on strategic analysis. De
-
The Nexus between Ethiopia’s Security and Its Landlockedness
This study examines how Ethiopia's landlocked status affects its national security in Economic, pol
-
An Impact Assessment of Flooding on Food Security
Ingram 出版This book looks at the impact of flooding on Dagiri Community of Gwagwalada Area Council in Abuja N
-
The Security of the Internet of e-healthcare Things
The field of healthcare knew an important development due to the evolution of the technology used i
-
Principles of Information Security, Loose-Leaf Version
Cengage 出版Discover the latest trends, developments and technology in information security with Whitman/Mattor
-
VoIP Network Security and Forensic Models Using Patterns
Revision with unchanged content. Voice over Internet Protocol (VoIP) networks is becoming the most
-
Food Security and Agricultural Production in Africa
The agricultural sector alone is capable of initiating growth in countries where it contributes for
-
Asking Front Lines National Security Journalists About Framing
This research investigates a critical tier in the global flow of information about terrorism. This
-
Computer Based Test With Emphasis on Result Integrity and Security
As flexible and online learning arbitrated by ICT becomes more ubiquitous, there is a developing ne
-
Social Security and Policy Risk
Revision with unchanged content. Social Security rules have changed constantly since its creation,
-
Examination of Security Strategies in the Great Lakes Region in Africa
EDUCATION AND CREDENTIALS: Doctor of Management in "Homeland Security" from Colorado Tech Universit
-
Process of Ensuring Cloud Security
Cloud computing is the present trend followed throughout the world. It is much evolved especially i
-
Quranic Encyclopedia of Security, Volume 2
The Quranic Encyclopedia of Security Vol 2 is a comprehensive research that evolves the strategic s
-
Climate Change and Food Security
This study was conducted in selected areas of eastern Ethiopia with the objectives of understanding
-
The Effect of Adoption of Agricultural Technology on Food Security
The researcher followed three types of research studies namely; questionnaires, observation and doc
-
Smart Home Security
Security is a challenging topic with varying levels of complexity, depending on the application fie
-
Gender Equality in Agriculture to Promote Food Security in Tanzania
It is well recognized that gender equality enables participatory engagements of both men and women
-
Insider’s Guide to Security Clearances
Ingram 出版With a security clearance you can get a job or bid on classified government contracts with the Depa
-
European Union Security and Defence
Springer 出版This book explores the multilayer nexus among inter-related international and regional secur
-
Communication Security in Wireless Sensor Networks
Revision with unchanged content. A wireless sensor network (WSN) usually consists of a large number
-
Adoption Of Post-harvest Technologies And Household Food Security
To achieve food security, it is not only imperative to increase farm production but also to adopt p
-
Security Attacks in Wireless Sensor Networks
Due to the fundamental characteristics, security is very crucial for wireless sensor networks. Wire
-
Security Issues in VANET
This book, based on dissertation, offers a comprehensive coverage of different security issues such
-
Approaches to International Peace and Security and its Prospects
The book discussed the role of the African Union in promoting regional peace and security, the subs
-
The role of Azerbaijan in the context of EU energy security
The book deals with the issue of energy security in the European Union, and the role played by Azer
-
Cciso Certified Chief Information Security Officer All-In-One Exam Guide
McGraw-Hill 出版Take the challenging CCISO exam with confidence using the comprehensive information contained in th
-
Impact of Information Security Initiatives on Supply Chain Performance
The issue of information exchange among supply chain partners in the business environment has been
-
Security Essentials of Cloud Computing - A Research Based Guide
The presented book is entirely based on the research on various components of cloud computing opera
-
Enterprise Networking, Security, and Automation (Ccnav7) Companion Guide & Labs and Study Guide Value Pack
Cisco Press 出版Enterprise Networking, Security, and Automation (CCNA v7) Companion Guide is designed as a portabl