Search Results - "IT security"
Suggested Topics within your search.
Suggested Topics within your search.
- National security 950
- Security measures 943
- Computer security 650
- Computer networks 564
- Foreign relations 528
- Security, International 522
- Prevention 513
- History 510
- Politics and government 429
- Terrorism 399
- Government policy 309
- Military policy 292
- Law and legislation 222
- Political aspects 213
- Social security 212
- Securities 207
- Social aspects 202
- International cooperation 193
- International relations 190
- Environmental sciences 180
- Environment 174
- Management 158
- Economic aspects 147
- World politics 146
- Internal security 142
- Finance 138
- Derivative securities 127
- Internet 126
- Data protection 123
- Economic policy 120
-
221
Maritime security an introduction /
Published 2008Subjects: “…Merchant marine Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
222
-
223
Information security policy, processes, and practices /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
224
Space and security a reference handbook /
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
225
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
226
-
227
-
228
Securing the state /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
229
Security/Mobility : Politics of Movement /
Published 2017Table of Contents: “…1 Introduction: Security/ Mobility and the politics of movement -- 1 Prologue: Movement then and now -- 2 Connectivity as problem: security, mobility, liberals, and Christians -- Part I: Things on the move -- 3 The power of cyberspace centralisation: analysing the example of data territorialisation -- 4 Commercialised occupation skills: Israeli security experience as an international brand -- 5 Mobility, circulation, and homeomorphism: data becoming risk information -- Part II: People on the move -- 6 'Illegals' in the Law School of Athens: public presence, discourse, and migrants as threat -- 7 The management of African asylum seekers and the imaginary of the border in Israel -- 8 Reinventing political order? …”
Full text available:
Electronic eBook -
230
Secession and Security : Explaining State Strategy against Separatists /
Published 2017Table of Contents: “…An external security theory of secessionist conflict -- Pakistan's genocide in Bengal and limited war in Balochistan, 1971-1977 -- India's strategies against secessionists in Assam, Punjab, and Kashmir, 1985-1994 -- The Ottoman Empire's escalation from reforms to the Armenian genocide, 1908-1915 -- Peaceful and violent separatism in Europe, the Middle East, and North America, 1861-1993.…”
Full text available:
Electronic eBook -
231
Sensing In/Security : Sensors as transnational security infrastructures /
Published 2021Table of Contents: “…Bowker -- Micro-climates of (in)security in Santiago : sensors, sensing and sensations / Martin Tironi and Matías Valderrama -- Smart cities, smart borders : sensing networks and security in the urban space / Ilia Antenucci.…”
Full text available:
Electronic eBook -
232
Human rights, human security, and state security : the intersection /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
233
Human rights, human security, and state security : the intersection /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
234
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Published 2014Subjects: “…Computer security Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
235
The markets for force : privatization of security across world regions /
Published 2015Subjects: “…Private security services.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
236
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Published 2014Subjects: “…Computer security Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
237
The markets for force : privatization of security across world regions /
Published 2015Subjects: “…Private security services.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
238
Security metrics management how to measure the costs and benefits of security /
Published 2006Subjects: “…Private security services.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
239
Perilous desert insecurity in the Sahara /
Published 2013Subjects: “…Security, International Sahara.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
240
Perilous desert insecurity in the Sahara /
Published 2013Subjects: “…Security, International Sahara.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook