„Spring Security“
Suchergebnisse
6.001 Treffer
-
The United States and the Taliban before and after 9/11
-
Intelligence, Biosecurity and Bioterrorism
-
AI in Cybersecurity
-
International Conference on Computer Networks and Communication Technologies – ICCNCT 2018
-
Human Rights Prosecutions in Democracies at War
-
Integrated Intelligent Computing, Communication and Security
-
Geospatial Technologies in Land Resources Mapping, Monitoring and Management
-
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation – Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings
-
Guide to Vulnerability Analysis for Computer Networks and Systems – An Artificial Intelligence Approach
-
Coping with Caveats in Coalition Warfare – An Empirical Research Program
-
Emerging Technologies in Data Mining and Information Security – Proceedings of IEMIS 2018, Volume 2
-
Smart Trends in Information Technology and Computer Communications – Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers
-
The Duty of Care of International Organizations Towards Their Civilian Personnel – Legal Obligations and Implementation Challenges
-
Great Powers and International Hierarchy
-
Biotechnologies of Crop Improvement, Volume 3 – Genomic Approaches
-
Drugs, Gangs, and Violence
-
Energy in Africa – Challenges and Opportunities
-
Data Science and Big Data Analytics – ACM-WIR 2018
-
Fundamentals of Digital Forensics – Theory, Methods, and Real-Life Applications
-
Will Brexit Damage our Security and Defence? – The Impact on the UK and EU