熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 20 筆, 頁數 1 / 1
呈現:
Cybersecurity: Politics, Governance and Conflict in Cyberspace
second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key...... more |
|||
Cybersecurity: Politics, Governance and Conflict in Cyberspace
second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key...... more |
|||
Bunyip
BUNYIP: A mythical creature from Australia’s ancient history. It is believed by some that the blood ... more |
|||
Bunyip
BUNYIP: A mythical creature from Australia’s ancient history. It is believed by some that the blood ... more |
|||
Sinkhole
|
|||
Sinkhole
|
|||
US National Cybersecurity: International Politics, Concepts and Organization
This volume offers an overview of the growing body of knowledge about cyber security and the related... more |
|||
Shakespeare’s Secrets
|
|||
US National Cybersecurity: International Politics, Concepts and Organization
|
|||
Police Vehicles
|
|||
Australian Defence Force Machines
|
|||
Delving Deep: Techniques We Wished We Had Known as Emerging Scholars
Research Methodology in Strategy and Management advances understanding of the methods used to study ... more |
|||
Methods to Improve Our Field
Research Methodology in Strategy and Management advances understanding of the methods used to study ... more |
|||
Research in Crisis: Research Methods in the Time of Covid-19
Research Methodology in Strategy and Management advances understanding of the methods used to study ... more |
|||
The Cyber Deterrence Problem
The Cyber Deterrence Problem brings together a multi-disciplinary team of scholars from multiple ins... more |
|||
Cybersecurity: Politics, Governance and Conflict in Cyberspace
|
|||
Federal Real Property Management: Partnership Options and Enhanced Use Leasing
|
|||
I Learned to Pray
|
|||
I Learned to Pray
|
|||
The Cyber Deterrence Problem
The national security of the United States depends on a secure, reliable and resilient cyberspace. T... more |