標題: Titlebook: Information Security Education. Education in Proactive Information Security; 12th IFIP WG 11.8 Wo Lynette Drevin,Marianthi Theocharidou Con [打印本頁] 作者: obsess 時間: 2025-3-21 18:36
書目名稱Information Security Education. Education in Proactive Information Security影響因子(影響力)
書目名稱Information Security Education. Education in Proactive Information Security影響因子(影響力)學科排名
書目名稱Information Security Education. Education in Proactive Information Security網絡公開度
書目名稱Information Security Education. Education in Proactive Information Security網絡公開度學科排名
書目名稱Information Security Education. Education in Proactive Information Security被引頻次
書目名稱Information Security Education. Education in Proactive Information Security被引頻次學科排名
書目名稱Information Security Education. Education in Proactive Information Security年度引用
書目名稱Information Security Education. Education in Proactive Information Security年度引用學科排名
書目名稱Information Security Education. Education in Proactive Information Security讀者反饋
書目名稱Information Security Education. Education in Proactive Information Security讀者反饋學科排名
作者: 侵略 時間: 2025-3-21 20:25
Matt Bishop,Melissa Dark,Lynn Futcher,Johan Van Niekerk,Ida Ngambeki,Somdutta Bose,Minghua Zhu作者: Ingenuity 時間: 2025-3-22 01:45
Information Security Education. Education in Proactive Information Security12th IFIP WG 11.8 Wo作者: syncope 時間: 2025-3-22 08:14 作者: dowagers-hump 時間: 2025-3-22 12:40
Identifying Information Security Risks in a Social Network Using Self-organising Mapsisks in an organisation is investigated. Risk data were obtained from an organisation that deals in risk management, which were used to build a social network. A number of metrics associated with risk were calculated from the network, and these metrics were used to cluster the various entities using作者: 固定某物 時間: 2025-3-22 13:56 作者: Pde5-Inhibitors 時間: 2025-3-22 19:09 作者: infarct 時間: 2025-3-23 00:34 作者: Hectic 時間: 2025-3-23 03:29
ghly interdisciplinary approach, .Crime Scenery in Postwar Film and Photography. brings landscape studies into close dialogue with contemporary theory by paying sustained attention to how the gesture of retracing past events facilitates new configurations of the present and future..978-3-031-08888-9978-3-030-04867-9作者: mastopexy 時間: 2025-3-23 07:22 作者: aspect 時間: 2025-3-23 13:17 作者: maculated 時間: 2025-3-23 15:29 作者: nauseate 時間: 2025-3-23 20:13 作者: Endearing 時間: 2025-3-24 01:17 作者: Vertebra 時間: 2025-3-24 02:44
my attention is focused on the cultural connections between gun ownership, certain versions of masculinity, and notions of ‘respectability’ and ‘Englishness’. My interest is also excited by the ways in which these connected discourses were firmly institutionalised in Home Office and parliamentary ci作者: mydriatic 時間: 2025-3-24 07:53 作者: 獨輪車 時間: 2025-3-24 10:44
Natalia Miloslavskaya,Alexander Tolstoyificantly lacking, and transparency is—alarmingly, though unsurprisingly—not a priority in small museums. Using the David Owsley Museum of Art as a case study, this chapter will discuss our findings and the dangers unregulated acquisitions in small museums can pose to cultural heritage preservation 作者: Synchronism 時間: 2025-3-24 16:53
Rudi Serfontein,Hennie Kruger,Lynette Drevindological models we use for analyses. The readership of this book is expected to include academics, researchers, and practitioners in the fields of criminology, sociology, law, and heritage studies who have an interest in art and heritage crime..978-3-030-84858-3978-3-030-84856-9Series ISSN 2524-7425 Series E-ISSN 2524-7433 作者: 吸引人的花招 時間: 2025-3-24 21:53
e heritage negligence; from colonial justice, where descendants of the colonisers criminalise the objects and practices of descendants of the colonised and enslaved, to decolonial justice, which acknowledges and repairs this oppression; from an understanding of heritage anchored in property to one t作者: Deject 時間: 2025-3-25 02:09 作者: Optometrist 時間: 2025-3-25 05:17 作者: 古董 時間: 2025-3-25 08:00
Jacques Ophoff,Frauke Dietzrely show much statistical association in studies of individual criminal behavior when controlling for the variables that reflect the micro-level processes arising from the immediate contexts discussed in chapter 3. But even if they are not statistically substantial, these macro-level variables and 作者: 中和 時間: 2025-3-25 15:40 作者: sparse 時間: 2025-3-25 18:25 作者: 觀察 時間: 2025-3-25 23:33
Information Security Education. Education in Proactive Information Security978-3-030-23451-5Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: bile648 時間: 2025-3-26 04:04 作者: 外科醫(yī)生 時間: 2025-3-26 07:50
Conference proceedings 2019Portugal, in June 2019..The 12 revised full papers presented were carefully reviewed and selected from 26 submissions. The papers are organized in the following topical sections: innovation in curricula; training; applications and cryptography; and organizational aspects. .作者: Intervention 時間: 2025-3-26 09:53 作者: voluble 時間: 2025-3-26 13:35 作者: 安心地散步 時間: 2025-3-26 18:32 作者: 外表讀作 時間: 2025-3-26 23:33 作者: Cocker 時間: 2025-3-27 03:22
Identifying Security Requirements Body of Knowledge for the Security Systems Engineerconsidered in the changing technological landscape. Although not all systems engineers must have expert knowledge in this field, all systems engineers must have fundamental knowledge in security practice and the ability to apply systems thinking.作者: 我們的面粉 時間: 2025-3-27 09:00 作者: 克制 時間: 2025-3-27 12:07 作者: 字的誤用 時間: 2025-3-27 16:18 作者: jettison 時間: 2025-3-27 21:27
Blockchain and Its Security: Ignore or Insert into Academic Training?ity issues. It also lists standards and books, which can support this training. On these bases, the desired competencies after mastering a full-time BCT course and an exemplary structure of this course are proposed.作者: Arteriography 時間: 2025-3-28 00:31
Andragogy as a Scientific Basis for Training Professionals in Information Securitycording to the criteria of adulthood was carried out, the possibilities of applying the basic provisions of andragogy to the object (an educational system) and the subject (processes, methods, and technologies of training) of research in the selected area were considered.作者: paragon 時間: 2025-3-28 02:26
1868-4238 zed in the following topical sections: innovation in curricula; training; applications and cryptography; and organizational aspects. .978-3-030-23453-9978-3-030-23451-5Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: LAITY 時間: 2025-3-28 08:20 作者: candle 時間: 2025-3-28 14:06 作者: GRUEL 時間: 2025-3-28 15:26
pretation of landscape by bringing it into close dialogue.EnThis book offers a rare and innovative consideration of an enduring tendency in postwar art to explore places devoid of human agents in the wake of violent encounters. To see the scenery together with the crime elicits a double interrogatio作者: ectropion 時間: 2025-3-28 20:12 作者: CHYME 時間: 2025-3-29 00:41
in the media.Uses quantitative data to analyse the use of nuThis book offers a comparative exploration of how journalists across different newsrooms around the world access and interpret statistics when producing stories related to crime. Looking at the nature of news sources regularly used by journ作者: Endoscope 時間: 2025-3-29 06:40 作者: Campaign 時間: 2025-3-29 08:12 作者: groggy 時間: 2025-3-29 15:07 作者: CROAK 時間: 2025-3-29 17:35 作者: fringe 時間: 2025-3-29 20:08
Pascal Lafourcade,Takaaki Mizuki,Atsuki Nagao,Kazumasa Shinagawaserious problem, because these items are usually out of their archaeological context and no provenance data are available. This paper describes a method used successfully by experts of the regional Government of Aragon (Spain) under the judicial proceedings related to the Helmet operations carried o作者: Excise 時間: 2025-3-30 02:41
Natalia Miloslavskaya,Alexander Tolstoylliance of Museums’ (AAM) “Standards Regarding Archaeological Material and Ancient Art” remain largely unstudied. Issued in 2008, the AAM’s guidelines establish mechanisms for public accountability: (1) museums should maintain a publicly available collection policy; (2) if a museum acquires an objec作者: 粘連 時間: 2025-3-30 05:16
Rudi Serfontein,Hennie Kruger,Lynette Drevinaluation of criminological methods and theories that have noThis volume brings together work by authors who draw upon sociological and criminological methods, theory, and frameworks, to produce research that pushes boundaries, considers new questions, and reshape the existing understanding of "art c作者: Benign 時間: 2025-3-30 09:13
nstitution, patrimonialisation, restitution dispute, and final restitution, which is a case of heritage return within a State. The collection belongs to the Civil Police Museum in Rio de Janeiro and was recently transferred to the Museum of the Republic, in a State reparation towards the Afrobrazili作者: 嚴重傷害 時間: 2025-3-30 12:34
Juan-Marc Scrimgeour,Jacques Ophoffnstitution, patrimonialisation, restitution dispute, and final restitution, which is a case of heritage return within a State. The collection belongs to the Civil Police Museum in Rio de Janeiro and was recently transferred to the Museum of the Republic, in a State reparation towards the Afrobrazili作者: 干旱 時間: 2025-3-30 20:17