1
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

2
by Torrens, Robert
Published 1819
Printed for R. Hunter
Subjects: ...Ricardo, David / 1772-1823 / Proposals for an economical and secure currency...

3
by Narayanan, Sudheesh
Published 2013
Packt Pub.
Subjects: ...Apache Hadoop / Security measures / blmlsh...

4
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

5
by Land, Michael
Published 2014
CRC Press
Table of Contents: ...Ch. 1. Introduction to security management -- ch. 2. Security management and critical thinking...

6
by Maguire, Mark
Published 2014
Pluto Press
... Europe is now home to a vast security industry which uses biometric identification systems, CCTV...

7
by Berling, Trine Villumsen
Published 2022
Taylor & Francis
Subjects: ...security logics...

8
by Maguire, Mark
Published 2014
Pluto Press
... Europe is now home to a vast security industry which uses biometric identification systems, CCTV...

9
by Ermoshina, Ksenia
Published 2022
Mattering Press
...It does so by examining how different solutions of cryptography for secure communications...

10
by Ermoshina, Ksenia
Published 2022
Mattering Press
...It does so by examining how different solutions of cryptography for secure communications...

11
by Clarke, Justin
Published 2005
Safari Tech Books Online
Subjects: ...Computer security...

12
by Ricks, Truett A.
Published 2015
CRC Press
Table of Contents: ...Part 1. Security and safety planning -- part 2. Infrastructure protection...

13
by Hayden, Lance
Published 2016
McGraw-Hill Education
Subjects: ...Computer security...

14
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

15
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

16
by Arway, Arthur G.
Published 2013
CRC Press
Table of Contents: ...pt. 1. What is supply chain security? -- pt. 2. Developing a supply chain security program -- pt. 3...

17
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

18
by Chivasa, Norman
Published 2023
IntechOpen
...This book, Global Peace and Security, is a collection of reviewed and relevant research chapters...

19
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...