-
Information Systems Security and Privacy
Springer 出版This book constitutes the revised selected papers of the 5th International Conference on Informatio
-
-
The Security State in Pakistan
Routledge 出版The War on Terror has been going on for over a decade and it shows no signs of winding down in near
-
Governance of Security and Ignored Insecurities in Contemporary Europe
Routledge 出版This book explores changes in security governance in Europe from the 1990s, focusing on some of the
-
Eu Security Policy and Crisis Management
Routledge 出版This book explores European Union crisis management and draws implications for its role as an inter
-
Security in Roman Times
Routledge 出版Using literary, epigraphic, numismatic and iconographic sources this book investigates the safety d
-
Private Security and Identity Politics
Routledge 出版This book examines the self-representation and identity politics of Private Military and Security C
-
Learn Kubernetes Security
Packt 出版Secure your container environment against cyberattacks and deliver robust deployments with this pra
-
Cell Phone Transactional Security
The book is all about emerging cellular Transactional Securityin modern banking era.
-
Social Security and Medicare
Wiley 出版The long-term future of the American Social Security system which provides retirement, disability,
-
Routledge Handbook of Naval Strategy and Security
Routledge 出版This new handbook provides a comprehensive overview of the issues facing naval strategy and securit
-
Routledge Handbook on Israeli Security
Routledge 出版The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical
-
Routledge Handbook of Gender and Security
Routledge 出版This handbook provides a comprehensive look at the study of gender and security in global politics.
-
Professional Security Management
Routledge 出版Historically, security managers have tended to be sourced from either the armed forces or law enfor
-
Critical Security, Democratisation and Television in Taiwan
Routledge 出版This title was first published in 2001. By examining the way the ruling Nationalist Party (KMT) dom
-
Beyond the Security Dilemma
Routledge 出版This title was first published in 2001. The security dilemma has long been at the heart of the secu
-
Physical Layer Security
Springer 出版This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-Lo
-
Microsoft 365 Security Administration
Packt 出版Get up to speed with expert tips and techniques to help you prepare effectively for the MS-500 Exam
-
ECCWS 2020- Proceedings of the 19th European Conference on Cyber Warfare and Security
Ingram 出版These proceedings represent the work of contributors to the 19th European Conference on Cyber Warfa
-
Ict Systems Security and Privacy Protection34th Ifip Tc 11 International Conference, SEC 2
Springer 出版This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on I
-
Will Brexit Damage Our Security and Defence?
Palgrave M 出版This Palgrave Policy Essential considers the security and defence consequences of Brexit for the UK
-
The CIA and the Pursuit of Security
Ingram 出版Since its creation in 1947, the CIA has been at the heart of America's security apparatus. Written
-
Security Requirements Analysis A Complete Guide - 2020 Edition
5starcooks 出版Have you defined which data is gathered how? Are risk triggers captured? Has data output been valid
-
Transportation Security A Complete Guide - 2020 Edition
5starcooks 出版How can the value of Transportation Security be defined? What is the definition of Transportation S
-
Information Technology Security A Complete Guide - 2020 Edition
5starcooks 出版Are controls in place to segregate groups of information services, users and information systems? D
-
Security Administration A Complete Guide - 2020 Edition
5starcooks 出版Has the Security Administration value of standards been quantified? Is there a clear Security Admin
-
Security Requirements Engineering A Complete Guide - 2020 Edition
5starcooks 出版Is Security Requirements Engineering required? What are the top 3 things at the forefront of your S
-
Security Key A Complete Guide - 2020 Edition
5starcooks 出版What Security key data should be collected? How will you measure your Security key effectiveness? D
-
Document Security A Complete Guide - 2020 Edition
5starcooks 出版Do you need to avoid or amend any Document security activities? Is Document security linked to key
-
Renewable Security A Complete Guide - 2020 Edition
5starcooks 出版What information is critical to your organization that your executives are ignoring? How significan
-
Security Screening A Complete Guide - 2020 Edition
5starcooks 出版At what point will vulnerability assessments be performed once Security Screening is put into produ
-
Virtual Assistant Security A Complete Guide - 2020 Edition
5starcooks 出版Has data output been validated? Where do ideas that reach policy makers and planners as proposals f
-
IT Security Risk Assessment A Complete Guide - 2020 Edition
5starcooks 出版Who is gathering IT security risk assessment information? Among the IT security risk assessment pro
-
Automotive Security A Complete Guide - 2020 Edition
5starcooks 出版Where is Automotive security data gathered? How do the Automotive security results compare with the
-
Security Policy Framework A Complete Guide - 2020 Edition
5starcooks 出版What is the source of the strategies for Security Policy Framework strengthening and reform? Who is
-
Paradox of nation building and national security interest in Ethiopia
Establishing a means of reconciling between nation building activities and national security was a
-
Cyber Security Software A Complete Guide - 2020 Edition
5starcooks 出版Cyber security software risk decisions: whose call Is It? Was a Cyber security software charter dev
-
Identity Based Security A Complete Guide - 2020 Edition
5starcooks 出版Do you have an implicit bias for capital investments over people investments? What are the performa
-
Youth unemployment, poverty and security challenges in Nigeria
The rate of youth unemployment in Nigeria has been on the increase since the return of civil rule i
-
Intelligence Cycle Security A Complete Guide - 2020 Edition
5starcooks 出版How do you gather the stories? What Intelligence cycle security metrics are outputs of the process?