-
Risk Analysis, Hazard Mitigation and Safety and Security Engineering XIII
Ingram 出版Research and industrial developments in the theoretical and practical aspects of safety and securit
-
Cyber Security
Ingram 出版Cyber security has never been more essential than it is today, it's not a case of if an attack will
-
-
The Service of Security and Information
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Information Systems Security
Springer 出版This book constitutes the refereed proceedings of the18th International Conference on Information S
-
God’s Security To Plan and Purpose
Ingram 出版THIS BOOK IS A CONTINUATION OF MY FIRST BOOK TITLED "HUMAN SECURITY TO GOD'S SECURITY" WHILST THE F
-
A Time-state-preference Model of Security Valuation
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Fair Play for Cuba Committee. Hearings Before the Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws of the Committee on the Judiciary, United
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
Computational Intelligent Security in Wireless Communications
Ingram 出版Wireless network security research is multidisciplinary in nature, including data analysis, economi
-
The Responsibility to Protect and the Failures of the United Nations Security Council
Bloomsbury 出版What can be done if the United Nations Security Council fails to protect people from mass atrocitie
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Network and
-
Security, Privacy, and Applied Cryptography Engineering
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Security, Pr
-
God’s Security To Plan and Purpose
Ingram 出版THIS BOOK IS A CONTINUATION OF MY FIRST BOOK TITLED "HUMAN SECURITY TO GOD'S SECURITY" WHILST THE F
-
National Security Strategy
Ingram 出版In a world that is ever-changing and increasingly interconnected, this Strategy argues tht the Unit
-
An exploratory study of role tension among Central Industrial Security Force personnel
Ingram 出版ABSTRACT The present study is an attempt to examine the role stress dimensions in Central Industria
-
Cryptology and Network Security
Springer 出版This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conf
-
-
-
Advances in Information Security and Privacy
Ingram 出版With the recent pandemic emergency, many people are spending their days in smart working and have i
-
Paradigms on Technology Development for Security Practitioners
Springer 出版This open access book is authored by a rich mix of contributors from across the landscape of
-
International Hipaa, Privacy, and Security Law Considerations
International HIPAA, Privacy and Security Law Considerations addresses the old and new generations
-
Winning the National Security AI Competition
Apress 出版In introducing the National Security Commission on AI's final report, Eric Schmidt, former Google C
-
The Increasing Gold Supply and its Effect on Security Values; Interest Rates; Commodity Prices
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
King of Nord, The end of all religions, Peace and Security on Earth
Blurb 出版Will there be another world conflict? Who will prevail in coming clash between Anglo-Amerika power
-
Development, Globalization, Global Values, and Security
Springer 出版This book, written in honor of Arno Tausch, presents cutting-edge research on globalization, develo
-
The Whole Process of E-Commerce Security Management System
Springer 出版This book systematically and integrally introduces the new security management theories and
-
Security in Smart Home Networks
Springer 出版This book presents the security and privacy challenges of the smart home following the logic of "te
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Subversive Control of the United Public Workers of America. Hearings Before the Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws of the Comm
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
How Money Is Made In Security Investments
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
An Introduction to Environmental Security and Peace
Lulu.com 出版This curriculum manual is the culmination of a yearlong exercise in the form of workshops, symposia
-
Lightweight Secure Network Coding for Security and Privacy of Smart Sensor Objects
Ingram 出版Network coding existed for a very long time. It provides efficient techniques to enhance the effici
-
Social Security Law in Italy
Ingram 出版Derived from the renowned multi-volume International Encyclopaedia of Laws, this book describes the
-
Basic Principles and Foundations of Biosafety and Laboratory Security in a Tuberculosis and Hiv/AIDS Reference Laboratory.
Lulu.com 出版This book examines the biological safety principles, characterization of four biosafety levels, are
-
Legal Conceptions of National Security Relevant To Counter-Terrorism and Human Rights Law and Policy
Ingram 出版The attack of 9/11 sparked off some crucial national security questions. One of such question is on
-
Social Security Programs Throughout the World
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
-
Islamic Law and Security
Ingram 出版Islam, as a faith is a complete code of life. It tells its followers how to lead a happy and prospe
-
Transportation Security
Lulu.com 出版Information about Transportation Security from a state transportation agency by a practicing profes
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
-
Romania Army, National Security and Defense Policy Handbook Volume 1 Strategic Information and Developments
Romania Army, National Security and Defense Policy Handbook Volume 1 Strategic Information and Deve
-
US Assistance to Turkey Handbook Volume 2 Defense, Security Cooperation and Assistance
Ingram 出版US Assistance to Turkey Handbook volume 2 Defense, Security Cooperation and Assistance
-
How Money Is Made In Security Investments
This work has been selected by scholars as being culturally important, and is part of the knowledge
-
-
Ontario Security Guard Pre-Test
Lulu.com 出版This course is designed to get you ready for the Ministry Test - Includes all areas and 2 completio
-
In Case of Emergency - A Book for Computer Security Experts at the Edge of a Nervous Breakdown
Lulu.com 出版This book has been written for IT Security Experts (or all kind of IT geeks) at the edge of a nervo