Erweiterte Suche
Preis einschränken:

18,50 EUR*
Details Horses-on-the-Storm

At the edge of the Judaean Desert, bandits are menacing the stability of the kingdom of Herod the Great. Alarmed at the unsteadiness of its aging ally and the threat to the security of its gateway to the East, Rome dispatches Tribune Ulpius Crus and a ...

44,81 EUR*
Details Physical-and-Logical-Security-Convergence-Powered-By-Enterprise-Security-Management

Physical and Logical Security Convergence Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape ...

106,99 EUR*
Details The-Globalization-of-Security-State-Power-Security-Provision-and-Legitimacy-New-Security-Challenges

The Globalization of Security The Globalization of Security is an important rethinking of the connections between globalization and security, focusing on a conceptual examination of the role of the state combined with key case studies. The book ...

57,41 EUR*
Details Email-Security-with-Cisco-IronPort-Networking-Technology-Security

Email Security with Cisco Ironport Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's messaging environments and shows you how to systematically anticipate and respond to them ...

203,29 EUR*
Details Strategies-for-Achieving-Food-Security-in-Central-Asia-NATO-Science-for-Peace-and-Security-Series-C-Environmental-Security

Strategies for Achieving Food Security in Central Asia Food Security is a primary concern for all countries. This book summarises the presentations of a NATO Advanced Training Course addressing the issue of food security in Central Asia. The book is ...

15,24 EUR*
Details Agfeo-Security-Line-Montageplatten-Security-Line-Fr-Funkmodul-Vpe-10X

Agfeo Security Line, Montageplatten, VPE: 10 Stück, für Funkmodule

30,97 EUR*
Details Beautiful-Security-Leading-Security-Experts-Explain-How-They-Think

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design ...

102,16 EUR*
Details Technology-and-Security-Governing-Threats-in-the-New-Millennium-New-Security-Challenges

Technology and Security This book takes forward the existing state of academic understanding where security and technology intersect. It assesses the challenges posed by emerging scientific and technological developments for security while ...

260,81 EUR*
Details Threats-to-Global-Water-Security-NATO-Science-for-Peace-and-Security-Series-C-Environmental-Security

Threats to Global Water Security Water resources are under threat in many parts of the world. Climate change and natural disasters like earthquakes are aggravating already critical situations. This work focuses on the threats from climate change and ...

80,99 EUR*
Details Security-Strategies-in-Linux-Platforms-and-Applications-Information-Systems-Security-Assurance

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is ...