Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
integration theories » integration theorems, integrationstheorie 2, integration theory
data integration » data integrity
security service » security services
cyber security » water security
supply cyber » supply case, supply cote
integration theories » integration theorems, integrationstheorie 2, integration theory
data integration » data integrity
security service » security services
cyber security » water security
supply cyber » supply case, supply cote
1
by Shaw, Kenneth A. 1941-,
Published 2013
Format:
Published 2013
Table of Contents: “... of processes and information -- 2. Nature of information -- 3. Modeling integrated information and processes...”
Click to View
2
by Christen, Markus.
Published 2020
Format:
Published 2020
Table of Contents: “....3.3 Stages of an Intrusion -- 2.4 Threats and Solutions in Data Security -- 2.4.1 Unauthorised Disclosure...”
Click to View
3
by Li, Hui.
Published 2021
Format:
Published 2021
Table of Contents: “... Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber...”
Click to View