|
Showing 1 - 15 of
15 matches in All Departments
|
It Is as It Is (Hardcover)
David Brazier, Ruby Lee
|
R1,955
R1,535
Discovery Miles 15 350
Save R420 (21%)
|
Ships in 10 - 15 working days
|
Dynamite presents the first 18 issues of the acclaimed Red Sonja
series in one massive omnibus, featuring the work of Mike Carey,
Michael Avon Oeming, Mel Rubi, Pablo Marcos, Lee Moder, Stephen
Sadowski, Michael Turner, Alex Ross, John Cassaday, Joe Linsner,
and many more.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects.Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects.Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects. Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects. Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
|
|