-
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century 电子书下载
Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this ...
06-27 [ None ]
-
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories 电子书下载
This report addresses consequences of current and proposed restrictions on international contacts by the U.S. Department of Energ ...
04-10 [ None ]
-
A SysAdmin’s Essential Guide to Linux Workstation Security 电子书下载
A SysAdmin’s Essential Guide to Linux Workstation Security How to work from anywhere and keep your data, identity, and sanity ...
06-18 [ None ]
-
Himalayan Glaciers: Climate Change, Water Resources, and Water Security 电子书下载
Scientific evidence shows that most glaciers in South Asia`s Hindu Kush Himalayan region are retreating, but the consequences for ...
06-07 [ None ]
-
-
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide 电子书下载
Spring Security 3.1 ...
06-27 [ None ]
-
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives 电子书下载
In recent years, drug use, illegal migration and human trafficking have all become more common in Asia, North America and Asia: t ...
09-27 [ None ]
-
Spring Security 3.1 电子书下载
«Spring Security 3.1» is an incremental guide that will teach you how to protect your application from malicious users. You will ...
06-27 [ None ]
-
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications) 电子书下载
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architec ...
09-06 [ None ]
-
-
Spring Security 3 电子书下载
Secure your web applications against malicious intruders with this easy to follow practical guide Make your web applications imp ...
06-27 [ None ]
-
-
Security Design Patterns 电子书下载
This Technical Guide provides a pattern-based security design methodology and a system of security design patterns. This methodol ...
04-10 [ None ]
-
-
-
-
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers 电子书下载
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy ...
10-08 [ None ]
-