Search Results - "IT security"

  1. 221

    Maritime security an introduction / by McNicholas, Michael

    Published 2008
    Subjects: “…Merchant marine Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 222
  3. 223

    Information security policy, processes, and practices /

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 224
  5. 225

    Information security a manager's guide to thwarting data thieves and hackers / by Alexander, Philip, 1963-

    Published 2008
    Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 226
  7. 227
  8. 228

    Securing the state / by Omand, David

    Published 2010
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 229

    Security/Mobility : Politics of Movement /

    Published 2017
    Table of Contents: “…1 Introduction: Security/ Mobility and the politics of movement -- 1 Prologue: Movement then and now -- 2 Connectivity as problem: security, mobility, liberals, and Christians -- Part I: Things on the move -- 3 The power of cyberspace centralisation: analysing the example of data territorialisation -- 4 Commercialised occupation skills: Israeli security experience as an international brand -- 5 Mobility, circulation, and homeomorphism: data becoming risk information -- Part II: People on the move -- 6 'Illegals' in the Law School of Athens: public presence, discourse, and migrants as threat -- 7 The management of African asylum seekers and the imaginary of the border in Israel -- 8 Reinventing political order? …”
    Full text available:
    Electronic eBook
  10. 230

    Secession and Security : Explaining State Strategy against Separatists / by Butt, Ahsan I., 1983-

    Published 2017
    Table of Contents: “…An external security theory of secessionist conflict -- Pakistan's genocide in Bengal and limited war in Balochistan, 1971-1977 -- India's strategies against secessionists in Assam, Punjab, and Kashmir, 1985-1994 -- The Ottoman Empire's escalation from reforms to the Armenian genocide, 1908-1915 -- Peaceful and violent separatism in Europe, the Middle East, and North America, 1861-1993.…”
    Full text available:
    Electronic eBook
  11. 231

    Sensing In/Security : Sensors as transnational security infrastructures /

    Published 2021
    Table of Contents: “…Bowker -- Micro-climates of (in)security in Santiago : sensors, sensing and sensations / Martin Tironi and Matías Valderrama -- Smart cities, smart borders : sensing networks and security in the urban space / Ilia Antenucci.…”
    Full text available:
    Electronic eBook
  12. 232
  13. 233
  14. 234
  15. 235

    The markets for force : privatization of security across world regions /

    Published 2015
    Subjects: “…Private security services.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 236
  17. 237

    The markets for force : privatization of security across world regions /

    Published 2015
    Subjects: “…Private security services.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 238

    Security metrics management how to measure the costs and benefits of security / by Kovacich, Gerald L.

    Published 2006
    Subjects: “…Private security services.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 239

    Perilous desert insecurity in the Sahara /

    Published 2013
    Subjects: “…Security, International Sahara.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 240

    Perilous desert insecurity in the Sahara /

    Published 2013
    Subjects: “…Security, International Sahara.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook