Search alternatives:
22power resources » power resources, manpower resources, power resource
2f security » 2 security, rf security, f security
20 security » 2.0 security, 2 security, 10 security

1
Published 2015
Springer India
Table of Contents: ... Approach -- Chapter 2. The Tertiary Economy: A Threat to the Global Economy -- Chapter 3. Measuring Energy...

2
by Evans, Joanne
Published 2009
Edward Elgar
Subjects: ...Power resources / Economic aspects...

3
Published 2000
Springer US
Table of Contents: ... Perception Model -- 20. A Simple and Efficient Approach to Verifying Cryptographic Protocols -- 21. Power...

4
Published 1995
Springer Netherlands
Table of Contents: ...1. Management of Plutonium in Russia -- 2. Overview Long-Term Disposition Options for Plutonium...

5
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ... Organization / John Mallery -- 1.Obstacles to Security -- 2.Computers are Powerful and Complex -- 3.Current...

6
by Ye, Feng, Qian, Yi, Hu, Rose Qingyang
Published 2018
John Wiley & Sons
Table of Contents: ... Control Centers 20 -- 2.2.3 Power Generators 22 --...

7
Published 2023
Springer Nature Switzerland
Table of Contents: ... in the Maritime Sector -- Chapter 2. Decarbonizing the Maritime Industry - Current Environmental Targets...

8
Published 2022
CRC Press
Table of Contents: ... and Counter Measures. 7. Blockchain Security Issues. 8. Power plant Systems Threats and Counter Measures. 9...

9
Published 2015
Springer Netherlands
Table of Contents: ... ecological Security of Foodstuffs and Human -- 20. Nano sensors in Systems of Ecological Security -- 21...

10 Table of Contents: ...Environment -- Secure Baseline -- Sandboxing -- Integrity Measurement -- Chapter 21 Review...

11
by Weissman, Jonathan
Published 2021
McGraw-Hill
Table of Contents: ... Analysis -- Key Term Quiz -- Chapter 20 Risk Management -- Lab Exercise 20.01: PowerShell Script Settings...

12
by Jha, Raghbendra
Published 2016
Edward Elgar Pub.
Table of Contents: ... Economic Review, 2 (3), September, 299-320 -- Jere R. Behrman and Anil Deolalikar (1989), 'Is Variety...

13
Published 2021
Springer Nature Singapore
Table of Contents: ... Complex Pignistic Belief Transform for Conflict Measure in Complex Evidence Theory -- A secure aggregation...

14
Published 2016
Springer Nature Singapore
Table of Contents: ...'s Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational...

15
Published 2021
Emerald Publishing Limited
Table of Contents: ... / Napoleon Kurantin and Bertha Z. Osei-Hwedie -- chapter 2. Sub-Saharan African (SSA) growth trajectory : how...

16
Published 2017
Springer Nature Singapore
Table of Contents: ...Chapter 1. A Novice Approach for Web Application Security -- Chapter 2. Correlation between Text...

17
by Brittain, Jason
Published 2003
O'Reilly & Associates
Table of Contents: ....3.1.4. Using JDBCStore for storing sessions; 2.4. Accessing JNDI and JDBC Resources; 2.4.2. Other JNDI...

18
by Basu, Swapan
Published 2017
Academic Press is an imprint of Elsevier
Table of Contents: ... -- Basics of Hazard, Risk Ranking, and Safety Systems; 1.0 INTRODUCTION; 2.0 HAZARD AND RISK; 2...

19
Published 2018
Springer Nature Singapore
Table of Contents: ... on Groundwater Resources -- Part VI Inter- and Trans-Disciplinary for Approaching Nexus Issues -- 20...

20
by Kutscher, Charles F., Milford, Jana B., Kreith, Frank
Published 2019
CRC Press
Table of Contents: ... of Solar Radiation -- 10.7.1 Instruments for Measuring Solar Radiation and Sunshine -- 10.7.2 Detectors...