Search alternatives:
securite » security, secure

1
Published 2003
Springer US
Table of Contents: ...A Network Management Viewpoint on Security in e-Services -- Security and Certification Issues...

2
Published 2022
Springer International Publishing
Table of Contents: ... on University Strategy -- 9)Optimal IT Governance Incentives -- 10)IT Governance and Information Security -- 11...

3
by Smith, M.F.
Published 1989
Springer Netherlands
Table of Contents: ...1 Introduction -- 2 Evaluability Assessment: Overview of Process -- 3 Determine Purpose, Secure...

4
by Zheng, Dawei
Published 2015
CRC Press/Balkema
Table of Contents: .... Chen -- Researches on coalition-proof data security in cloud computing / Y.H. Yu & L. Wu -- Research...

5
Published 2019
The National Academies Press
Table of Contents: ... -- Consequences of child poverty -- How the labor market, family structure, and government programs affect child...

6
by Liu, Hsiang-Chuan
Published 2014
CRC Press, Taylor and Francis
Table of Contents: ... transmission lines on the same towerSoftware security concerns modeling method based on UML extension; Video...

7
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Algorithms for Secure Communication -- Chap. 7 Algorithmics for the Life Sciences -- Chap. 8 The Shortest...

8
by Pritscher, Conrad P.
Published 2011
SensePublishers
... and the National Security Agency. Being blind to what our brains can do is slowly changing. Brain researchers...

9
Published 2023
Palgrave Macmillan
... to high, public and private, government, and across departments of education. Inclusive education...