181
Published 2020
The World Bank
... technology (DLT) entails for secured transactions and collateral registry (STCR) frameworks. In particular...

182
Published 2020
The World Bank
... of the UNCITRAL Model Law on Secured Transactions. While this model is the primary reference, the Guidance Note...

183
by Abay, Kibrom A.
Published 2020
The World Bank
... Safety Net Program on the adverse impacts of the COVID-19 pandemic on the food and nutrition security...

184
Published 2022
OECD Publishing
...The OECD Policy Framework on Digital Security charts the economic and social dimension...

185
by Prokop, Darren
Published 2017
Butterworth-Heinemann is an imprint of Elsevier
Subjects: ...Business logistics / Security measures...

186
by Mahnovski, Sergej
Published 2007
RAND Project Air Force
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / International Security...

187
by Ajmani, Neelesh, Kumar, Dinesh
Published 2017
Apress
Table of Contents: ...Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk...

188
by Biringer, Betty E.
Published 2013
Taylor & Francis
Table of Contents: ...Section 1. Security risk assessment -- section 2. Evaluation and design of resilient systems...

189
by Choudhry, Moorad
Published 2010
Bloomberg Press
Subjects: ...BUSINESS & ECONOMICS / Investments & Securities / General / bisacsh...

190
by Sanghera, Paul
Published 2007
Syngress Pub.
... to library books. For security professionals needing to get up and running fast with the topic of RFID...

191
by LeBlanc, Jonathan, Messerschmidt, Tim
Published 2016
O'Reilly Media
Table of Contents: ...Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals...

192
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...: Intelligence Background; Chapter 3: Advantages of an Intelligence-Based Program; Chapter 4: Corporate Security...

193
by Siepmann, Frank
Published 2014
CRC Press
...Information security books...

194
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

195
by Fischer, Bernd R.
Published 2013
Academic Press
Subjects: ...BUSINESS & ECONOMICS / Investments & Securities / General / bisacsh...

196
by Landoll, Douglas J.
Published 2016
CRC Press
Table of Contents: ...Chapter 1. Introduction -- chapter 2. Information security policy basics -- chapter 3. Information...

197
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

198
by Wehrlé, Frédéric
Published 2016
OECD Publishing
... of risks for national security stemming from or related to international investment has increased. Many...

199
by Cali, Leonard
Published 2017
OECD Publishing

200
by Mansfield, Carol
Published 2015
Edward Elgar Pub. Ltd
... of reflection toward enhancing homeland security regulation in the United States. In the context of this new era...