„Spring Security“
Suchergebnisse
6.001 Treffer
-
Muslims, Schooling and Security – Trojan Horse, Prevent and Racial Politics
-
Cyberstrategien für Unternehmen und Behörden – Maßnahmen zur Erhöhung der Cyberresilienz
-
Fluid Security in the Asia Pacific – Transnational Lives, Human Rights and State Control
-
Secure and Privacy-Preserving Data Communication in Internet of Things
-
People, Risk, and Security – How to prevent your greatest asset from becoming your greatest liability
-
Social Media for Government – A Practical Guide to Understanding, Implementing, and Managing Social Media Tools in the Public Sphere
-
Information Security of Highly Critical Wireless Networks
-
The New US Security Agenda – Trends and Emerging Threats
-
Prioritization Theory and Defensive Foreign Policy – Systemic Vulnerabilities in International Politics
-
Great Powers, Weak States, and Insurgency – Explaining Internal Threat Alliances
-
Fundamentals of IP and SoC Security – Design, Verification, and Debug
-
Eleanor Roosevelt and the Anti-Nuclear Movement – The Voice of Conscience
-
War, Peace and International Security – From Sarajevo to Crimea
-
National Security, Surveillance and Terror – Canada and Australia in Comparative Perspective
-
Fundamentals of Network Forensics – A Research Perspective
-
Android Application Security – A Semantics and Context-Aware Approach
-
Self-Selection Policing – Theory, Research and Practice
-
The Origins and Dynamics of Genocide: – Political Violence in Guatemala
-
The EU's Common Security and Defence Policy – Learning Communities in International Organizations
-
Subjective Logic – A Formalism for Reasoning Under Uncertainty