Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
341
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
342
Research on the Entered Business Model of Telecom Customer Behavior Tagged Data
Published 2013-11-01Subjects: Get full text
Article -
343
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01Subjects: Get full text
Article -
344
-
345
NIGERIAN YOUTH UNEMPLOYMENT AND SECURITY ISSUES: EVALUATING THE ENTREPRENEURSHIP OPTION
Published 2024-05-01Subjects: “…Security Challenger…”
Get full text
Article -
346
Scaling up Sustainable Agriculture and Food Security With Nanoscience and Technology
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
347
CLIMATE CHANGE AND LAND-BASED CONFLICT: THE IMPACT ON FOOD SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
348
IMPACT OF CLIMATE CHANGE ON THE GROWTH, YIELD, AND SUNFLOWER CULTIVAR PERFORMANCE UNDER THE INFLUENCE OF PLANT DENSITY.
Published 2025-01-01Subjects: “…GDD, CAT, Climate action, food security…”
Get full text
Article -
349
Le Caire, 2011. Plongée ethnographique au coeur des lijân sha’abeya (comités populaires)
Published 2012-10-01Subjects: Get full text
Article -
350
Violência urbana em Novo Hamburgo: notas introdutórias
Published 2008-01-01Subjects: Get full text
Article -
351
Overview on industrial Internet honeynet technology
Published 2024-10-01Subjects: Get full text
Article -
352
Cancelable Biometric Template Generation Using Random Feature Vector Transformations
Published 2024-01-01Subjects: “…Template security…”
Get full text
Article -
353
Présentation de la nomenclature des préjudices réparables en cas d'atteintes à l'environnement
Published 2010-10-01Subjects: Get full text
Article -
354
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
355
-
356
Cloud Computing Security Construction Analysis of China Telecom Business Platform
Published 2013-04-01Subjects: Get full text
Article -
357
-
358
JOHAN GALTUNG'S CONCEPT OF PEACE CULTURE AND ITS IMPLEMENTATION IN INDONESIA
Published 2022-10-01Subjects: Get full text
Article -
359
Multi-language oriented automatic realization method for cryptographic protocols
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
360
Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Published 2015-12-01Subjects: Get full text
Article