-
The Transfer of Negotiable Paper as Collateral Security, Being the Sharswood Prize Essay of the University of Pennsylvania for the Year 1886, and the Johnson Prize Essay for the Same Year
"The Transfer of Negotiable Paper as Collateral Security" by Lewis Lawrence Smith offers a detailed
-
Civil Protection and Domestic Security in Contemporary Hybrid Warfare
Routledge 出版This book presents a comprehensive approach to civil protection and domestic security in contempora
-
-
-
Post-Quantum Cryptography Algorithms and Approaches for Iot and Blockchain Security
Ingram 出版Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security, Volume 138 the
-
-
Planetary Health and Social Security
Routledge 出版Offering an in-depth exploration of the security challenges posed by COVID-19, Gunaratna, Aslam, an
-
Information Security Governance Using Artificial Intelligence of Things in Smart Environments
CRC Press 出版The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT)
-
Blockchain Security and Its Application in Internet of Things
Mdpi AG 出版The reprint aims to guide readers through the latest cybersecurity approaches in applying blockchai
-
-
Higher Love (Sentinel Security N.Y.C. Book 3)
Mahaba Books 出版LOVE DESERVES A SECOND CHANCESix years ago, Mary disappeared without a trace, leaving Trigger shatt
-
Food Security and Coping Strategies of Ata-Manobo Tribe
Eliva Press 出版This study delves into the experiences of the Ata-Manobo tribe in maintaining a food-secure home an
-
Cyber Security Kill Chain - Tactics and Strategies
Packt 出版Understand the cyber kill chain framework and discover essential tactics and strategies to effectiv
-
-
-
Security Theory
Security theory in the use of artificial intelligence focuses on employing this type of technology
-
Redefining Information Security
Kogan Page 出版Redefining Information Security shows security and technology leaders how to build a security-drive
-
-
-
-
-
Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Security an
-
-
-
-
Land Use Policy and Food Security
Mdpi AG 出版Food security is foundational for the stable development of society and the economy, with the land
-
IoT Network Security
Mdpi AG 出版The rapid development of the Internet of Things (IoT) has led to significant advancements in IoT-em
-
101 Tips to Win Your Social Security Disability Claim
Go on a journey with Avi Leibovic, Esq. as the disability expert teaches readers how to win their c
-
-
The History and Evolution of Homeland Security in the United States
CRC Press 出版The History and Evolution of Homeland Security in the United States provides a comprehensive and in
-
Systematic Security
CRC Press 出版Systematic Security: A CISO's Playbook by Timur Qader offers a groundbreaking guide to building a r
-
-
Internal Security
Terrorism, militancy, insurgency or Left Wing Extremism - whatever be the name ascribed to them, al
-
Security Technologies for Law Enforcement Agencies
CRC Press 出版"Security Technologies for Law Enforcement Agencies" offers a comprehensive examination of the tool
-
-
-
-
-
Holistic IoT Security, Privacy and Safety
Ingram 出版The Internet of Things (IoT) is rapidly transforming our world, connecting billions of devices and
-
-
Machine Learning in Healthcare and Security
CRC Press 出版The book brings a blend of different areas of Machine Learning and the recent advances in the area.
-
-
Nutrition and Food Security for All
Mdpi AG 出版When producing food, it is crucial to take into account both the waste generated in the food chain
-
-
-
Identity Security for Software Development
Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though of
-
Water Security in the MENA Region
Water Security in the MENA Region: Strategies for Sustainable Management and Resilience in an Arid
-