-
Safety and Security of Critical Transport Infrastructure
The present book SAFETY AND SECURITY OF CRITICAL TRANSPORT INFRASTRUCTURE debates current issues an
-
Cryptology and Network Security
Springer 出版This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conf
-
Achieving Global Food Security
Ingram 出版This book examines the current food security challenges in the small states with a focus on the Car
-
Methods for ensuring security in big data (Big Data)
This paper considers the basic concepts and principles of data security and their importance for th
-
Intellectual Security Strategy to Confront Terrorism and Extremism
Ingram 出版This study deals with the topic of "Intellectual Security Strategy to Confront Extremism, Violence
-
Enhancing Information Security
Since the start of Covid in late 2019, a lot of organizations and businesses have made big moves in
-
Breastfeeding and food and nutrition security
These are the results of a research project that aimed to analyse and discuss the relationship betw
-
Detecting Security Vulnerability in Web Applications
In this research work, we presented a new XSS defense strategy framework based on soft-computing ap
-
Becoming an Independent Security Consultant - Second Edition
Ingram 出版Many people who are retiring from law enforcement, the military, or careers in private security wou
-
The Role of Newspapers in Combating Nigeria’s Security Issues
Ingram 出版The study, "The Role of Newspapers in Combating Nigeria's Security Issues", was set to analyse the
-
Certified Information Systems Security Professional (CISSP) Exam Guide
Packt 出版Master the skills to safeguard information assets in a dynamic digital landscape and achieve your C
-
-
Food Security in the Caribbean
Palgrave M 出版Food security is a pressing concern in the Caribbean. Caribbean countries produce and export crops
-
Offensive Security Using Python
Packt 出版Unlock Python's hacking potential and discover the art of exploiting vulnerabilities in the world o
-
AWS Security Cookbook - Second Edition
Packt 出版Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and
-
AI-based Static Application Security Testing Guide
Code smells are usually ignored as they are neither a bug, nor a vulnerability. Quality engineers a
-
An Integrated Approach to Home Security and Safety Systems
CRC Press 出版This book provides an integrated solution for security and safety in the home, covering both assist
-
Facets of Security in the United Arab Emirates
Routledge 出版The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies
-
The Security Leader’s Communication Playbook
CRC Press 出版This book is for cybersecurity leaders across all industries and organizations. It is intended to b
-
Advances in Cyber Security and Intelligent Analytics
CRC Press 出版The book highlights the challenges faced by emerging paradigms and presents the recent developments
-
An Interdisciplinary Approach to Modern Network Security
CRC Press 出版An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and tren
-
Nanoelectronic Devices for Hardware and Software Security
CRC Press 出版This book has comprehensive coverage of the principles, basic concepts, structure, modelling, pract
-
Privacy and Security Challenges in Cloud Computing
CRC Press 出版This reference text discusses various security techniques and challenges for cloud data protection
-
Security Analytics
CRC Press 出版This book discusses a range of topics from information security to cryptography, mobile application
-
Security and Privacy-Preserving Techniques in Wireless Robotics
CRC Press 出版The wide gap between the existing security solutions and the actual practical deployment in smart m
-
Cyber Security and Operations Management for Industry 4.0
CRC Press 出版This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks
-
Information Security Handbook
CRC Press 出版This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary resea
-
Security and Privacy Trends in Cloud Computing and Big Data
CRC Press 出版It is essential for an organization to know before involving themselves in cloud computing and big
-
Trust, Security and Privacy for Big Data
CRC Press 出版Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machi
-
Cloud Security
CRC Press 出版This book is written with an intension to provide a thorough and detailed discussion on various fun
-
Routledge Handbook of Democracy and Security
Routledge 出版This handbook explores how democracies around the world seek to balance their democratic values wit
-
Gendered Labour, Everyday Security and Migration
Routledge 出版Drawing on original empirical research from Singapore and Hong Kong, Gendered Labour, Everyday Secu
-
Security Awareness Design in the New Normal Age
CRC Press 出版This book will primarily consider the problem of hitting that 'Sweet Spot' in the age of 'New Norma
-
Green Computing in Network Security
CRC Press 出版This book focuses on green computing-based network security techniques and addresses the challenges
-
Next-Generation Enterprise Security and Governance
CRC Press 出版This book will address the cybersecurity and cooperate governance challenges associated with enterp
-
Security and Resilience of Cyber Physical Systems
CRC Press 出版This book addresses the various security and privacy issues involved in the cyber physical system a
-
AI and Deep Learning in Biometric Security
CRC Press 出版This book provides an in-depth overview of artificial intelligence and deep learning approaches wit
-
Cyber-Security Threats, Actors, and Dynamic Mitigation
CRC Press 出版Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-a
-
Information Security and Optimization
CRC Press 出版Information Security and Optimization maintains a practical perspective while offering theoretical
-
Blockchain for Information Security and Privacy
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constant
-
Security in Transnational Spaces
Routledge 出版This book focuses on transnationalism as a key concept to evaluate how Europe experiences, perceive
-
European Strategic Autonomy and Small States' Security
Routledge 出版This book analyses whether the EU's drift towards European strategic autonomy presents a challenge
-
Computer Security - Esorics 2024
Springer 出版This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Sym
-
Comparisons in Global Security Politics
Available open access digitally under CC-BY-NC-ND licence. Comparative practices are integral to gl
-
Evolving Roles of Chief Information Security Officers and Chief Risk Officers
In "Evolving Roles of Chief Information Security Officers (CISO) and Chief Risk Officers (CRO)," re
-
Security Officer
The Security Officer Passbook(R) prepares you for your test by allowing you to take practice exams
-
Advancing Computational Intelligence Techniques for Security Systems Design
Ingram 出版Security systems have become an integral part of the building and large complex setups and interven
-
Computer Security - Esorics 2024
Springer 出版This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Sym