-
-
Reconstructing Japan’s Security
Ingram 出版Systematically analyses the impact of external military crises on Japanese security policy expansio
-
Evaluating the Africa-Eu Partnership on Peace and Security
Palgrave M 出版Interregional cooperation in peace and security as key feature of the EU external relations is part
-
Trust, Privacy and Security in Digital Business
Springer 出版This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privac
-
Cyberspace Safety and Security
Springer 出版This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace
-
Cyber Warfare, Security and Space Research
Springer 出版This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Sec
-
Science of Cyber Security
Springer 出版This book constitutes the proceedings of the 4th International Conference on Science of Cyber Secur
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 20th International
-
Computer Security - Esorics 2022
Springer 出版The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symp
-
The Gendered and Colonial Lives of Gurkhas in Private Security
Ingram 出版This book explores the ways in which affect, colonial histories, and militarism organise global sec
-
Climate Risks to Water Security
Palgrave M 出版In Asia and the Pacific, climate change is now a well-recognised risk to water security but respons
-
Artificial Intelligence and Cyber Security in Industry 4.0
Springer 出版This book provides theoretical background and state-of-the-art findings in artificial intelligence
-
Handover of Power - Security
Safety rethought Do you sometimes worry that you can no longer go out on the street on your own wit
-
Handover of Power - Security
Safety rethought Do you sometimes worry that you can no longer go out on the street light-hearted o
-
7 Rules To Become Exceptional At Cyber Security
Ingram 出版What every current and aspiring cyber security leader and professional needs to know to become trul
-
China and Global Food Security
Ingram 出版In less than half a century (1978-2020), China has transformed itself from a country that barely fe
-
Information and Communications Security
Springer 出版This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Inform
-
Food Security and Food Sovereignty Challenges in Africa
This edited volume advances knowledge of food security and food sovereignty for students and resear
-
-
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the proceedings of the 41st International Conference on Computer Safety, Reli
-
Energy Security in the Eastern Mediterranean Region
Palgrave M 出版This book aims to provide an overview of crucial aspects related to the interconnection between the
-
Computer Safety, Reliability, and Security. Safecomp 2022 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2022, whic
-
The Role of Regional Security Exchanges
This title is part of UC Press's Voices Revived program, which commemorates University of Californi
-
The Role of Regional Security Exchanges
The Role of Regional Security Exchanges by James E. Walter examines an often-overlooked but vital s
-
Security in the Gulf
The British Empire employed a diverse range of strategies to establish and then maintain control ov
-
Smart Card Security
CRC Press 出版Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card
-
Targeted Sanctions and Human Rights. Challenging the UN Security Council’s 1267 Regime
Grin Verlag 出版Academic Paper from the year 2016 in the subject Law - European and International Law, Intellectual
-
Your Short Guide to Security Systems
Ingram 出版Did you know that a home without a security system is three times more likely to be targeted for a
-
-
Staple Security
Ingram 出版Egyptians often say that bread is life; most eat this staple multiple times a day, many relying on
-
-
Staple Security
Egyptians often say that bread is life; most eat this staple multiple times a day, many relying on
-
Isc2 Cissp Certified Information Systems Security Professional Official Practice Tests
Sybex 出版Full-length practice tests covering all CISSP domains for the ultimate CISSP prep The ISC2 CISSP Of
-
Automating Security Detection Engineering
Packt 出版Accelerate security detection development with AI-enabled technical solutions using threat-informed
-
Advances in Information and Computer Security
Springer 出版This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSE
-
Routledge Handbook of Peace, Security and Development
Routledge 出版This Handbook offers a comprehensive examination of the peace, security, and development nexus from
-
Routledge Handbook of Arctic Security
Routledge 出版The Routledge Handbook of Arctic Security offers a comprehensive examination of security in the reg
-
The Routledge International Handbook of Universities, Security and Intelligence Studies
Routledge 出版In an era of intensified international terror, universities have been increasingly drawn into an ar
-
Security
How do we know when we are investing wisely in security? Answering this question requires investiga
-
Women, Police and Security
Ingram 出版As the first anniversary of the Taliban's return to power approaches in August 2022, many people ar
-
Security
How do we know when we are investing wisely in security? Answering this question requires investiga
-
Fundamentals of Water Security
Wiley 出版FUNDAMENTALS OF WATER SECURITY Understand How to Manage Water Resources to Equitably Meet Both Huma
-
IPhone Security & Privacy - Fortifying Your Digital Life
Are you concerned about the safety and security of your digital life on your iPhone?In "iPhone Secu
-
Cyber Security Threats and Challenges Facing Human Life
CRC Press 出版Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues
-
Security Yearbook 2024
Wiley 出版A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading
-
Exam Ref Az-500 Microsoft Azure Security Technologies
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure secu
-
Human Aspects of Information Security and Assurance
Springer 出版This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human As