2
Published 1985
Springer Netherlands
Table of Contents: ... applications of teleoperation -- 4.5 Industrial applications of teleoperation -- 4.6 Applications in security...

3
by Tan, Joseph K. H.
Published 2005
Jossey-Bass
Table of Contents: ... Sheps, Joseph Tan -- E-security : frameworks for privacy and security in e-health data integration...

4
by El-Kholy, O.
Published 1992
Springer Netherlands
Table of Contents: ... and security -- Three: The Response -- 20 Understanding the environment -- 21 Perceptions and attitudes -- 22...

5
by Enterprise Foundation Staff
Published 1991
Springer US
Table of Contents: ...: Secure Preliminary Project Approval -- Stage: Bidding -- Step 20: Match Potential Bidders to the Job...

6
Published 1984
Springer US
Table of Contents: ... -- 3.3 Data protection and security -- 3.4 Working environment -- 3.5 Work and leisure -- 4. Economic...

7
by McNeill, Dwight
Published 2013
Pearson
Table of Contents: ... analytics -- Security, privacy, and risk analytics in healthcare -- The birds and the bees of analytics...

8
by Weiss, Alan
Published 2019
John Wiley & Sons, Inc.

9
by Tou, Julius T.
Published 1978
Springer US
Table of Contents: ... Formulation and Test Run for Queries -- 5.3. Query Languages -- 5.4. Security -- 5.5. Locking in Distributed...

10
by Coughlin, Vincent J.
Published 1984
Springer Netherlands
Table of Contents: ... Specialized Test Equipment -- 5.8 Network Security -- 6. Network Structures -- 6.1 Topology Tradeoffs -- 6.2...

11
Published 2009
Physica
Table of Contents: ...A Security Assistance System Combining Person Tracking with Chemical Attributes and Video Event...

12
by Butterworth, Bill
Published 1984
Springer US
Table of Contents: ... -- Securing ownership. Sources of finance. Outright purchase. Bank loan. Leasing. Other finance. Replacement...

13
by Merritt, Frederick S.
Published 1990
Springer US
Table of Contents: ... Protection -- 6.7. Security -- 6.8. Barrier-Free Environments -- 6.9. Toxic Materials -- 6.10. Construction...

14
by Hedin, Hans
Published 2014
Wiley
... is what any CEO needs for securing successful business today and into the future. But...

15
by Amernick, Burton A.
Published 1991
Springer US
..., by securing for limited time to authors and inventors the exclusive right to their respective writings...

16
by Fekete, Ferenc
Published 1976
Springer Netherlands
... and security, have both called for and provided a basis for the exploitation of possibilities offered...