Showing results under subject: 'medicine'

Big Data Security (Volume 3)

Author:Banarjee Indiradip, Bhattacharyya Siddhartha, Guipta Shibakali
Publisher:De Gruyter
Abstract: After a short description of the key concepts of big data the book explores on the secrecy and secu…

Securing Village Life: Development in Late Colonial Papua New Guinea

Author:MacWilliam Scot
Publisher:ANU Press
Abstract: Securing Village Life: Development in Late Colonial Papua New Guinea examines the significance for …

Politics, Development and Security in Oceania

Author:Hegarty David, Tryon Darrel
Publisher:ANU Press
Abstract: The chapters in this volume canvass political change and development across the Pacific Islands fro…

Asia-Pacific Security: Policy Challenges

Author:W. Lovell Davi
Publisher:ANU Press
Abstract: Since September 11, 2001, our newspapers have been filled with the ‘war on terror’; our governments…

Security of Ubiquitous Computing Systems

Author:Avoine Gildas, Hernandez-Castro Julio
Publisher:Springer Nature
Abstract: The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the object…

UN Security Council Referrals to the International Criminal Court

Author:Skander Galand Alexandr
Publisher:Brill
Abstract: Galand critically spells out a comprehensive conception of the nature and effects of Security Counc…

Security, Loyalty, and Science

Author:Gellhorn Walte
Publisher:Cornell University Press
Abstract: Both sides of a sensitive problem are assessed by Professor Gellhorn in this penetrating analysis o…

Chapter 8 Non- South African SADC Navies and Maritime Security in the Post- Cold War Era

Author:Ndawana Enock
Publisher:Taylor & Francis
Abstract: Africa, Cape of Good Hope, maritime security, naval history, piracy, Suez Canal

Chapter 4 Albania Moving from Security Receiver to Security Provider

Author:Jano Dorian
Publisher:Taylor & Francis
Abstract: In its transition from a security receiver to a security provider, Albania has undertaken important…

Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security

Author:Mohr Marti
Publisher:KIT Scientific Publishing
Abstract: I report on applications of slicing and program dependence graphs (PDGs) to software security. More…
© Lagos APPEALS project 2023
Powered by: