Search alternatives:
environment protection » environment interaction

1
Published 2016
Springer International Publishing
Table of Contents: ...-Designing Information Systems for Environmental Sustainability -- Automated Plant Species Identification...

2
Published 2017
Springer Netherlands
Subjects: ...Environmental management...

3
Published 2017
Springer International Publishing
... on Environmental Software Systems, ISESS 2017, held in Zadar, Croatia, in May 2017. The 35 revised full papers...

4
by Vasudevan, Vinod
Published 2008
IT Governance Pub.
Subjects: ...Data protection / Standards...

5
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... assurance approach that is hardware-based is needed. A Trusted Execution Environment (TEE) or confidential...

6
by Wang, Hua, Cao, Jinli, Zhang, Yanchun
Published 2020
Springer International Publishing
Table of Contents: ... -- 5. A self-scalable anonymity payment approach in cloud environment -- 6. Using RBAC to secure...

7
by Shepherd, Carlton, Markantonakis, Konstantinos
Published 2024
Springer International Publishing
Table of Contents: ... Platforms -- Building Execution Environments from the Trusted Platform Module -- Trusted World Systems...

8
by Shackleford, Dave
Published 2013
Wiley
... practices, and strategies used for securing physical environments do not provide sufficient protection...

9
Published 2007
Springer US
Subjects: ...Data protection...

10
Published 2021
Springer International Publishing
Table of Contents: ... with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query...

11
Published 2024
Springer International Publishing
Subjects: ...Data protection / Law and legislation...

12
by Yang, Jie, Chen, Yingying, Trappe, Wade, Cheng, Jerry
Published 2014
Springer International Publishing
Subjects: ...Data protection...

13
Published 2024
Springer Nature Switzerland
Table of Contents: ...: Protection at Operations -- 7. CTAM: a tool for Continuous Threat Analysis and Management -- 8. EARLY - a...

14
by Malik, Zaki, Bouguettaya, Athman
Published 2009
Springer US
Table of Contents: ...Service-Oriented Environments -- Reputation Information Creation -- Reputation Assessment...

15
Published 2019
Springer International Publishing
Subjects: ...Data protection...

16
by Alexander, David
Published 2013
BCS Learning & Development Ltd.
Table of Contents: ...7 physical and environmental securitylearning outcomes; general controls; physical security...

17
by McDougall, Richard, Hoogendoorn, Evert, Cockcroft, Adrian, Bialaski, Tom
Published 1999
Prentice Hall PTR
Subjects: ...Nature / Environmental Conservation & Protection...

18
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

19
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

20
Published 2020
Springer International Publishing
Table of Contents: ... -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security...