MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles
  Exclusive Promotions

12 950 products for "security"

Advertisement

Examining the water, development and security linkages in Central Asia can feel a bit like solving a Rubiks cube. The Rubiks cube starts to usually find structure and the different pieces find
Fifteen years after the adoption of UN Security Council Resolution 1325 which establishes the Women, Peace and Security agenda, there is now a need to assess the impacts of gender equality efforts,
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and
17% OFF
In a lively debut[with] plenty of enthusiastic can-do advice (Publishers Weekly), a Homeland Security advisor and a Pulitzer Prizenominated columnistand mother of threedelivers a timely message about American security: it begins at
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.