-
In Case of Emergency - A Book for Computer Security Experts at the Edge of a Nervous Breakdown
Lulu.com 出版This book has been written for IT Security Experts (or all kind of IT geeks) at the edge of a nervo
-
Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Use, Storage and Movement
Control of nuclear material comprises the administrative and technical measures applied to ensure t
-
Developing a Nuclear Security Contingency Plan for Nuclear Facilities
This publication provides guidance to States, competent authorities and operators on how to develop
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Historical Groundwork for Contemporary Policy Issues on Human Security in Nigeria
Eliva Press 出版Historical Groundwork for Contemporary Policy Issues in Human Security in Nigeria is a collection o
-
Blockchain for International Security
Springer 出版This book intersects the distributed ledger technology (DLT) community with the international secur
-
Equipamiento para todos - Nivel 2 Seguridad Softcover Equipping for Everyone - Level 2 Security
Ingram 出版Todas las palabras tienen un significado que las define. Sin embargo, suelen estar sujetas a la int
-
Security Analytics for the Internet of Everything
Ingram 出版Security Analytics for the Internet of Everything compiles the latest trends, technologies, and app
-
Network Protocols for Security Professionals
Packt 出版Get to grips with network-based attacks and learn to defend your organization's network and network
-
Computational Methods for Medical and Cyber Security
Ingram 出版Over the past decade, computational methods, including machine learning (ML) and deep learning (DL)
-
AI and ML Applications for Decision-Making in Zero Trust Cyber Security
Discover the future of cybersecurity with "AI and ML Applications for Decision-Making on Zero Trust
-
The Quadrilateral Security Dialogue’s potential for becoming an Asian NATO
Grin Verlag 出版Seminar paper from the year 2021 in the subject Politics - International Politics - Region: South A
-
Potential Yields of Major Crops for Chinese and Global Food Security Under Climate Change
Springer 出版This book analyzes potential yields of six major food crops - rice, wheat, maize, potato, soybean a
-
The Quest for Security
Ingram 出版The British Empire entered the twentieth century in a state of crisis, with many in the legal estab
-
Cyber Security Applications for Industry 4.0
CRC Press 出版Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various dis
-
Enterprise-Grade It Security for Small and Medium Businesses
Apress 出版Understand the IT security features that are needed to secure the IT infrastructure of a small to m
-
Deep Learning for Computational Problems in Hardware Security
Springer 出版The book discusses a broad overview of traditional machine learning methods and state-of-the-art de
-
Machine Learning for Embedded System Security
Springer 出版This book comprehensively covers the state-of-the-art security applications of machine learning tec
-
Safeguarding Social Security for Future Generations
Routledge 出版This book offers a unique multigenerational approach to saving Social Security. Public programs hav
-
Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms
Springer 出版Chapter 1: Introduction(a) Reconfigurable hardware based embedded systems (b) Importance of Real Ti
-
Security and Cryptography for Networks
Springer 出版This book constitutes the proceedings of the 13th International Conference on Security and Cryptogr
-
Pulses for Food and Nutritional Security of India
Springer 出版This book provides an in-depth analysis of India's pulses sector in terms of production, prices, ma
-
Planning for Water Security in Southeast Asia
Anthem Press 出版This project centers on one of the material drivers of local democratic processes. Too often in pub
-
Advanced Circuits and Systems for Healthcare and Security Applications
Ingram 出版VLSI devices downscaling is a very significant part of the design to improve the performance of VLS
-
Information Security Technologies for Controlling Pandemics
Springer 出版The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home env
-
Advancing Computational Intelligence Techniques for Security Systems Design
Ingram 出版Security systems have become an integral part of the building and large complex setups, and interve
-
The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks
Ingram 出版In the world as we know it, you can be attacked both physically and virtually. For today's organisa
-
Cyber Security for Beginners
Ingram 出版Protecting yourself and your data against online threats and hacking has never been more critical,
-
Social Security as an instrument of social welfare for public servants
Municipal governments are public entities with their own legal personality and assets, obliged to c
-
Information Security Education for Cyber Resilience
Springer 出版This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Informa
-
Home Gardens for Improved Food Security and Livelihoods
Routledge 出版Home Gardens for Improved Food Security and Livelihoods demonstrates how home gardens hold particul
-
Security Risk Models for Cyber Insurance
Ingram 出版Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks ar
-
Recent Advances in Security, Privacy, and Trust for Internet of Things (Iot) and Cyber-Physical Systems (Cps)
CRC Press 出版Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are d
-
Technology Development for Security Practitioners
Springer 出版This volume is authored by a mix of global contributors from across the landscape of academia, rese
-
Soviet Decisionmaking for National Security
Routledge 出版This book, first published in 1984, analyses the critically important Cold War issue of the Soviet
-
Hardware Platform Security for Mobile Devices
Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for
-
Disruption, Ideation and Innovation for Defence and Security
Springer 出版This book explores types of disruptions in defence and security, ways to assess disruptions trigger
-
Security Basics for Computer Architects
Springer 出版Design for security is an essential aspect of the design of future computers. However, security is
-
Analysis Techniques for Information Security
Springer 出版Increasingly our critical infrastructures are reliant on computers. We see examples of such infrast
-
Split Manufacturing of Integrated Circuits for Hardware Security and Trust
Springer 出版Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. S
-
Data Leakage Detection and Prevention for Data Security
1. Introduction to Data SecurityThe National-Institute-of-Standards-and-Technology (NIST) explains
-
-
A New Structure for Security, Peace, and Cooperation in the Persian Gulf
Ingram 出版This book provides a new model for sustainable peace and security in the Middle East. It provides d
-
Comments for the IRRA Session on Employment Security
Ingram 出版This work has been selected by scholars as being culturally important, and is part of the knowledge
-
A List of the Voluntary Subscribers, With the Sums Each Subscribed and Paid, for the Security of His Majesty’s Person and Government, and for the Defence of the County of York, Begun at Bishop Thorp,
Ingram 出版The 18th century was a wealth of knowledge, exploration and rapidly growing technology and expandin
-
Security Issues for Wireless Sensor Networks
Ingram 出版Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wirel
-
Iot for Defense and National Security
Ingram 出版IoT for Defense and National Security Practical case-based guide illustrating the challenges and so