نتایج جستجو
Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy
Douglas C. Lovelace Jr. (editor), 2018
Definitive Guide to Security in Jakarta EE - Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Arjan Tijms, Teo Bais, Werner Keil, 2022
Connected Places: cyber security principles.
National Cyber Security Centre
Water Security in India: Water Policy and Human Security in the Indian Region
Vandana Asthana; A. C. Shukla, 2014
Security and Stability in the New Space Age: The Orbital Security Dilemma
Brad Townsend, 2020
Victims as Security Threats: Refugee Impact on Host State Security in Africa
Edward Mogire, 2016
United States - Africa Security Relations: Terrorism, Regional Security and National Interests
Kelechi A. Kalu; George Klay Kieh Jr., 2013
International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors
U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Arjan Tijms, Teo Bais, Werner Keil, 2022
Advances in Information and Computer Security: 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings (Lecture Notes in Computer Science, 13504)
Chen-Mou Cheng (editor), Mitsuaki Akiyama (editor), 2022
Rethinking Energy Security in Asia: A Non-Traditional View of Human Security
Mely Caballero-Anthony, Swee Lean Collin Koh (auth.), Mely Caballero-Anthony, Youngho Chang, Nur Azha Putra (eds.), 2012
Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform
Ursula C. Schroeder, Fairlie Chappuis, 2015
Essential Computer Security. Everyone's Guide to E-mail, Internet, and Wireless Security
Tony Bradley, CISSP-ISSAP (Eds.)
Security Analytics: A Data Centric Approach to Information Security
Mehak Khurana, Shilpa Mahajan, 2022
Critical Security Studies in the Digital Age: Social Media and Security
Joseph Downing, 2023
