Search alternatives:
general intelligence » social intelligence
security service » security services, security overview, security science
security secure » security security, security securing, security second

122
by Hayden, Lance
Published 2016
McGraw-Hill Education
Table of Contents: ...Machine generated contents note: Part I: Understanding Your Security Culture -- Chapter 1...

123
Published 2012
Springer Netherlands
Table of Contents: ...Part 1 Security Fundamentals -- Part 2 Industrial & Business Information Security -- Part 3...

124
Published 2023
Palgrave Macmillan
Table of Contents: ... Intelligence Threats to National and International Psychological Security, Marta N. Lukacovic and Deborah D...

125
by Ventre, Daniel
Published 2021
Wiley-ISTE
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

126
by Xiao, Yang
Published 2014
CRC Press
Table of Contents: ...pt. 1. Smart grids in general -- Chapter 1. An Overview of Recommendations for a Technical Smart...

127
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

128
Published 2024
Springer Nature Singapore
Table of Contents: ... in India: Implementing Blockchain Technology for Increased Transparency, Efficiency, and Security -- A...

129
Published 2022
Springer International Publishing
Table of Contents: ...Chapter 1. Introduction -- Chapter 2. Introduction Into Artificial Intelligence and Machine...

130
Published 2015
Springer New York
Table of Contents: ... Generalized Fatigue Diagram of Metals and Alloys -- Deflection on Hit-Count Curves in Acoustic Emission could...

131
by Weidman, Georgia
Published 2014
No Starch Press
Table of Contents: ... Eeckhoutte -- Microsoft Security Essentials / Peter Van Eeckhoutte -- VirusTotal / Peter Van Eeckhoutte...

132
Published 2013
CRC Press
Table of Contents: ...Chapter 1. Concepts and visions for urban transport and logistics relating to human security...

133
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... of Computer Network Security System: A Case Study -- Security Considerations and Models for Service Creation...

134
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... and Cloud Security -- General Transformation from KP-ABE to Searchable Encryption -- Supporting Security...

135
by Friedewald, Michael
Published 2017
Taylor & Francis
Subjects: ...security...

136
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Refinement for Administrative Policies -- Database Security -- Authenticating kNN Query Results in Data...

137
by Jaswal, Nipun
Published 2014
Packt Pub.
Table of Contents: ...; Preinteractions; Intelligence gathering / reconnaissance phase; Presensing the test grounds; Modeling threats...

138
by Limnios, N., Oprisan, G.
Published 2001
Birkhäuser
Table of Contents: ... -- 5.6 Reliability and Performability Modeling in the General State Space Case -- 6 Examples...

139
Published 2018
Springer International Publishing
Table of Contents: ... Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption...

140
by Boukherouaa, El Bachir
Published 2021
International Monetary Fund
Subjects: ...Financial Institutions and Services: General...