Search alternatives:
integration theories » integration theorems, integrationstheorie 2, integration theory
data integration » data integrity
security service » security services
cyber security » water security
supply cyber » supply case, supply cote
1
by Shaw, Kenneth A. 1941-,
Published 2013
Format:
Table of Contents: ... of processes and information -- 2. Nature of information -- 3. Modeling integrated information and processes...
Click to View
2
by Christen, Markus.
Published 2020
Format:
Table of Contents: ....3.3 Stages of an Intrusion -- 2.4 Threats and Solutions in Data Security -- 2.4.1 Unauthorised Disclosure...
Click to View
3
by Li, Hui.
Published 2021
Format:
Table of Contents: ... Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber...
Click to View