-
Contemporary Understanding of Security and Its Contexts
Ingram 出版Volatility is one of the most characteristic features of contemporary security.The level of threats
-
DK Super Planet Farming and Food Security
Ingram 出版Modern, authentic topic books which improve literacy and are mapped to the IB PYP, Cambridge Primar
-
National Security and Peace Building
"The Nigerian Military, National Security, and Peacebuilding: An Analytical Study of Military and C
-
Climate change and food security
Ingram 出版The debate around food production reflects the concern of various sectors about the need for new an
-
Cryptography & information Security
The field of Cryptography and Information Security is essential for protecting data in our increasi
-
Applied Cryptography and Network Security Workshops
Springer 出版This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held
-
Empowering the Un Security Council
Empowering the UN Security Council: Reforms to Address Modern Threats provides an in-depth analysis
-
Quantum Technology in Defence & Security
"Quantum Technology in Defence & Security" propels readers into the cutting-edge realm where quantu
-
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, man
-
August - A Tombs Security + Devil’s Rose MC Crossover
Cleo Browne 出版Ana Taylor, ex-pat Kiwi and stand-in leader of the Bartashev Bratva thrives on the chaos in her wor
-
Glocalized Security
Ingram 出版What forces drive violent conflicts, and whose interests are protected by military involvement? In
-
Glocalized Security
Ingram 出版What forces drive violent conflicts, and whose interests are protected by military involvement? In
-
資訊安全概論與實務(第四版)(含ITS Network Security網路安全管理核心能力國際認證模擬試題)
碁峰資訊 出版*國內資訊安全經典/暢銷第四版「資訊安全」是一門綜合科學,在學習資訊安全領域上,涵蓋了管理面、策略面、技術面等方向,需要從基礎理論的建立延伸到解決實務應用問題,從數位邊界、管理制度到掌握駭客攻擊手法
-
Applied Cryptography and Network Security Workshops
Springer 出版This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held
-
The Security Abolition Manifesto
As the supreme concept of bourgeois society, security underpins all existing structures of power.Se
-
Peace and Security
Lulu.com 出版This Book will provide a Compilation of Biblical, Geo-Political and Astronomical Research that Asce
-
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
Packt 出版Become a Certified Cloud Security Professional and open new avenues for growth in your careerPurcha
-
Security Psychology
The book is written on a topic that is relevant to our time. Safety has always been a concern of pe
-
Testing the Security of Real-World Electronic Voting Systems
Voting is the process through which a democratic society determines its government. Therefore, voti
-
The Security Consultant’s Guide to Home Security
Michael A. Silva is an independent security consultant with over 50 years of experience in advising
-
Cyber Space and Outer Space Security
This book delves into cutting-edge research, encompassing both theoretical and experimental aspects
-
Managing Contemporary Security Challenges in Nigeria
Palgrave M 出版This book covers a wide range of security issues in Nigeria, including insurgency, terrorism, herde
-
Network Security
Lulu.com 出版In an era where the digital realm is the cornerstone of modern connectivity, the importance of netw
-
Hardware Security
Springer 出版This book provides a look into the future of hardware and microelectronics security, with an emphas
-
Developing a Security Training Program
CRC Press 出版Developing a Security Training Program focuses on how to establish a comprehensive training program
-
Information Security and Privacy
Springer 出版This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, h
-
Offensive and Defensive Cyber Security Strategies
CRC Press 出版The aim of this book is to explore the definitions and fundamentals of offensive security versus de
-
Offensive and Defensive Cyber Security Strategies
CRC Press 出版The aim of this book is to explore the definitions and fundamentals of offensive security versus de
-
The National Security Constitution in the Twenty-First Century
A deeply researched, fully updated edition of The National Security Constitution that explores the
-
Cyber Security and Business Analysis
Ingram 出版The imperative of cyber security has never been more pronounced and organisations must remain proac
-
Improving the Security of Soft Targets and Crowded Places
Ingram 出版Attacks on soft targets and crowded places are a significant challenge. The U.S. Department of Home
-
Spring Security - Fourth Edition
Packt 出版Leverage the power of Spring Security 6 to protect your modern Java applications from hackersKey Fe
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
Data and Applications Security and Privacy XXXVIII
Springer 出版This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applica
-
Security and Privacy in Communication Networks
Springer 出版This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th Internat
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
Recent Advances in Computational Intelligence and Cyber Security
Ingram 出版In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computatio
-
Global Peace and Security
Intechopen 出版This book, Global Peace and Security, is a collection of reviewed and relevant research chapters of
-
The Politics of Cyber-Security
Routledge 出版By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offer
-
Customizable Security
Network security is a complex beast, and a one-size-fits-all solution rarely exists. "Customizable
-
Unequal Security
Routledge 出版Bringing together disciplines such as political science, criminology, sociology, and anthropology a
-
Extended Security Management
This book is very beneficial to all European and global decision-makers who are decision makers on
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
Sybex 出版CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information S
-
Mobile Internet Security
Springer 出版This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile I
-
Enhancing Cryptographic Systems Security against SCAs
Cryptography is essential for securing data from unauthorized access, yet Side-Channel Attacks (SCA
-
Socio-Economic Analysis of Household Livelihood Security Problems
The study provides a comprehensive overview of livelihood patterns and socio-economic dynamics in I
-
The Challenge of Extending Social Security in Burundi
In everyday life, man is always confronted with survival problems that disrupt his assets, and has