161
by Ye, Feng, Qian, Yi, Hu, Rose Qingyang
Published 2018
John Wiley & Sons
Table of Contents: ... 251 -- 12.4.3 Group Signature 251 -- 12.5 Security Analysis of the Proposed Schemes 252 -- 12.5.1...

162
by Boyraz, Guven
Published 2024
Packt Publishing, Limited
Table of Contents: ...: The Fundamentals of Endpoint Security and EDR -- Chapter 1: Introducing Endpoint Security and EDR -- An overview...

163
by Makan, Keith
Published 2014
Packt Pub.
Table of Contents: ... security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning...

164
by Aras, Ramazan
Published 2020
Palgrave Macmillan
Subjects: ...International Security Studies...

165
Published 2010
Birkhäuser
Table of Contents: ... System for Simulation and Research of Probabilistic Regularities and Statistical Data Analysis...

166
by Sehgal, Vandana Verma
Published 2023
Packt Publishing, Limited
Table of Contents: ...Chapter 3: Understanding the Security Posture -- Understanding your security posture -- Regular...

167
Published 2024
Springer Nature Singapore
Table of Contents: ...The change weight of threat in network security communication based on analysis of multisource data...

168
by Ali, Daniel Ayalew
Published 2019
The World Bank
... for titles, including willingness to pay, is high, current policies limit the scope for tenure regularization...

169
Published 2007
Springer US
Subjects: ...Security Science and Technology...

170
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ..., Regular Traffic Activity and Standard Configuration for Network Devices 57 -- 2. Monitor Systems...

171
Published 2023
Springer International Publishing
Table of Contents: ...Part I: Security Architecture in Eurasia: Speaking together: Regular Interaction and State...

172
Published 2018
Springer International Publishing
Table of Contents: ...IoT and sensor networks -- Learning-based networking -- Network deployment -- Network security...

173
by Wills, Michael S.
Published 2022
Sybex
Subjects: ...Computer networks / Security measures / Examinations / fast...

174
by Metcalf, Leigh, Casey, William
Published 2016
Syngress is an imprint of Elsevier
Table of Contents: ... -- 5.5.2.Complete and Regular Graphs -- 5.5.3. Weighted Graph...

175
Published 2020
Springer International Publishing
Table of Contents: ...Human Factors in Cybersecurity -- Privacy and Trust -- Usable Security Approaches...

176
by Baker, Debra
Published 2024
Packt Publishing Ltd.
Table of Contents: ...Quick reference -- Summary -- Chapter 3: Security Policies -- Where are your policies...

177
by Hosmer, Stephen T.
Published 2007
Rand Corp.
Table of Contents: ...Saddam made strategic miscalculations -- Saddam's internal security concerns weakened Iraqi...

178
Published 2016
Springer International Publishing
Table of Contents: ...Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception...

179
by Bahney, Benjamin
Published 2010
RAND
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism...

180
Published 2021
Springer International Publishing
Table of Contents: ... -- On Communication-E cient Asynchronous MPC with Adaptive Security -- Efficient Perfectly Secure Computation...