41
by Kumar, Rajeev, Khan, Suhel Ahmad, Khan, R. A.
Published 2023
CRC Press

42
by Conway, Jon
Published 2003
Prentice Hall, Professional Technical Reference
...National Instruments virtual instrumentation series...

43
by Khalid, Shahid F.
Published 2002
Prentice Hall
...National Instruments virtual instrumentation series...

44
by Maleh, Yassine, Maleh, Youness
Published 2022
Springer International Publishing
Table of Contents: ... -- The Moroccan View on Cybersecurity -- Morocco National Cybersecurity strategy -- National Cyber resilience...

45 Table of Contents: ...Foreword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing...

46
Published 2016
Springer International Publishing
Table of Contents: ...Part 1: Introduction -- OSINT as an integral part of the national security apparatus.-  Open Source...

47
by Reese, George
Published 2003
O'Reilly
Table of Contents: ...; NCHAR; NATIONAL CHAR; NATIONAL CHARACTER; NATIONAL VARCHAR; TEXT; TINYBLOB; TINYTEXT; VARCHAR; Dates...

48
Published 1969
Springer Berlin Heidelberg
Table of Contents: ...1. National Data Programs and National Committees for CODATA -- 1.1. National Data Programs -- 1.2...

49
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

50
Published 2016
Springer International Publishing
Table of Contents: ... Encryption -- Biometric Security -- Digital Forensics -- National Security Infrastructure -- Mobile Security...

51
Published 2016
Springer International Publishing
Table of Contents: ...National Security Infrastructure -- Social Network Security -- Bitcoin Security -- Statistical...

52
by Tu, Zipei
Published 2022
Springer Nature Singapore
Table of Contents: ... national administrative system -- The boundaries of artificial intelligence: risks and the future...

53
by Petrenko, Sergei
Published 2018
Springer International Publishing
Table of Contents: ... -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system...

54
by Kreines, David C.
Published 2004
O'Reilly
Table of Contents: ...; Jobs; Licenses; Locking and Transactions; Logging and Archiving; Memory Management; Names; National...

55
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical...

56
by Rice, David
Published 2008
Addison-Wesley
Table of Contents: ... Innovation and Perverse Incentives -- Ch. 3. The Power of Weaknesses: Broken Windows and National Security...

57
by Blyth, Andrew, Kovacich, Gerald L.
Published 2006
Springer London
Table of Contents: ... -- The Corporate Security Officer -- Corporate Security Functions -- IA in the Interest of National Security...

58
Published 2018
Springer Berlin Heidelberg
Table of Contents: ... Opinions on Software as a Weapon in the Context of (Inter)national Security -- OpenGL/D - An Alternative...

59
Published 2009
Vieweg+Teubner Verlag
Table of Contents: ... of the Internet in addressing Law Enforcement and National Security -- Theft of Virtual Property — Towards...

60
by Günther, Oliver
Published 1998
Springer Berlin Heidelberg
Table of Contents: .... National Information Infrastructure; The Catalogue of Data Sources for the Environment; UDK: A European...