Search alternatives:
development secure » development cure, development secureuml, development security
secure policy » secret policy, security policy, sector policy

41
by Fitzgerald, Todd
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security...

42
by Ginn, Jeremiah
Published 2022
PACKT PUBLISHING LIMITED
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

43
Published 2019
Springer International Publishing
Table of Contents: ... and Construction of China’s Social Protection System: A Discussion from the Perspective of Shared Development...

44
by Berman, Evan
Published 2015
Emerald
Table of Contents: ...Issues and concerns for Asian leadership in policy and governance / Evan Berman, M. Haque -- Chinas...

45
by Urea, Francisco Javier Ramírez
Published 2023
Packt Publishing Ltd.
Table of Contents: ...' security -- Network policies -- Service mesh -- Labs -- Improving application access by deploying your own...

46
by Sharma, Reetika
Published 2011
Pearson
Table of Contents: ... and China -- Tibet Issue -- Different political world view -- China's policy to develop its western region...

47
Published 2010
Springer Vienna
Table of Contents: ... in space policies, programmes and technologies throughout the world and in Europe -- Views and Insights...

48
Published 2015
Springer Vienna
Table of Contents: ... for security -- The impact of China's rise in space -- Russia: Space exploration and development prospects...

49
by Akbulut-Gok, Isil
Published 2022
Palgrave Macmillan
Table of Contents: ...Chapter 1: Introduction -- Part I: Theory Development -- Chapter 2: Theory of Interorganizational...

50
Published 2018
Springer International Publishing
Table of Contents: ...Coping with Climate Change Effects on Urban Infrastructure - Problem Structuring Based on Value...

51
by Szayna, Thomas S., Welser, William
Published 2013
Rand Corporation
...Developing and assessing options for the global Special Operations Forces (SOF) network...

52
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ... sophistication of identity attacks; Risk-based access control policy; Identity management across the device...

53
by Hinterleitner, Markus
Published 2020
Cambridge University Press
Table of Contents: ...How political systems manage their policy controversies -- Blame games in the political sphere...

54
Published 2022
The World Bank
Subjects: ...Food Security...

55
by Larsson, Anthony
Published 2023
Taylor & Francis
Subjects: ...Development economics and emerging economies...

56
Published 2019
Springer Nature Singapore
Table of Contents: ... and vegetable-based saline agricultural systems for nutritional and livelihood security -- Chapter 25...

57
by Dulaney, Emmett A.
Published 2011
Wiley Pub.
Table of Contents: ...; Developing Policies, Standards, and Guidelines; Summary; Exam Essentials; Review Questions; Answers to Review...

58
by Moreira da Silva, Miguel
Published 2020
Springer International Publishing
Subjects: ...Security Science and Technology...

59
by Diogenes, Yuri, Janetscheck, Tom
Published 2021
Microsoft Press
... to centralize and improve cloud security, even if you use multiple cloud providers Leverage major Azure Policy...

60
Published 2022
Palgrave Macmillan
Table of Contents: ...: Japan’s Security Partnerships in the Asia-Indo-Pacific (Elena Atanassova-Cornelis, University of Antwerp...