Books on the topic 'Security and reputation aggregation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 books for your research on the topic 'Security and reputation aggregation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chowdhry, Bhagwan. Information aggregation, security design, and currency swaps. National Bureau of Economic Research, 2002.
Find full textMercer, Jonathan. Reputation and international politics. Cornell University Press, 1996.
Find full textFalcone, Rino, Suzanne Barber, Larry Korba, and Munindar Singh, eds. Trust, Reputation, and Security: Theories and Practice. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36609-1.
Full textStuart, Campbell, and Brownstein Rob, eds. Security transformation: Digital defense strategies to protect your company's reputation and market share. McGraw-Hill, 2001.
Find full textDavis, Mark W. (Mark William), 1955-, ed. Digital assassination: Protecting your reputation, brand, or business against online attacks. St. Martin's Press, 2011.
Find full textSecurity, United States Congress House Committee on Homeland Security Subcommittee on Transportation. TSA's efforts to fix its poor customer service reputation and become a leaner, smarter agency: Hearing before the Subcommittee on Transportation Security of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, second session, June 7, 2012. U.S. G.P.O., 2013.
Find full textPerrig, Adrian, Dawn Song, Haowen Chan, and Hsu-Chun Hsiao. Secure Distributed Data Aggregation. Now Publishers, 2011.
Find full textMercer, Jonathan. Reputation And International Politics. Cornell University Press, 2010.
Find full textMercer, Jonathan. Reputation and International Politics. Cornell University Press, 2018.
Find full textChang, Elizabeth, E. Chang, Tharam S. Dillon, and Farookh Hussain. Trust and Reputation for Service-Oriented Environments. Wiley & Sons, Incorporated, John, 2006.
Find full textMcCarthy, Mary Pat, and Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. McGraw-Hill, 2001.
Find full textLupton, Danielle L. Reputation for Resolve. Cornell University Press, 2020. http://dx.doi.org/10.7591/cornell/9781501747717.001.0001.
Full textSecurity Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. McGraw-Hill, 2001.
Find full textChang, Elizabeth, Tharam Dillon, and Farookh Hussain. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Customer Confidence. Wiley & Sons, Incorporated, John, 2006.
Find full textChang, Elizabeth, Tharam Dillon, and Farookh Hussain. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. Wiley & Sons, Incorporated, John, 2006.
Find full textMark, Davis, and Richard Torrenzano. Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. St. Martin's Press, 2011.
Find full textCrescenzi, Mark J. C. Reputation, Learning, and the Onset of Alliances. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190609528.003.0005.
Full textDavid, John P. How to protect (or destroy) your reputation online: The essential guide to avoid digital damage, lock down your brand, and defend your business. 2017.
Find full textFalcone, Rino, Suzanne Barber, and Larry Korba. Trust, Reputation, and Security : Theories and Practice: AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers. Springer, 2014.
Find full textSingh, Munindar, Rino Falcone, Suzanne Barber, and Larry Korba. Trust, Reputation, and Security : Theories and Practice: AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers. Springer, 2003.
Find full textGrassiani, Erella. Commercialised occupation skills: Israeli security experience as an international brand. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9781526107459.003.0004.
Full text(Editor), Rino Falcone, Suzanne Barber (Editor), Larry Korba (Editor), and Munindar Singh (Editor), eds. Trust, Reputation, and Security: Theories and Practice: AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers (Lecture Notes in Computer Science). Springer, 2003.
Find full textMabbun, Richard, and Julian Makas. Red Flags: Recognize and eliminate the risks in your RIA firm’s Disaster Recovery, IT Compliance, and Cyber Security processes to safeguard your reputation and client trust. Createspace Independent Publishing Platform, 2014.
Find full textBurford, Mark. Family Affairs, Part II. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190634902.003.0003.
Full textCrescenzi, Mark J. C. Implications and Conclusions. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190609528.003.0006.
Full textCrescenzi, Mark. Of Friends and Foes. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190609528.001.0001.
Full textKampmann, Christoph, Julian Katz, and Christian Wenzel, eds. Recht zur Intervention – Pflicht zur Intervention? Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748926764.
Full textRandhawa, Gurvaneet S., and Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.
Full textDr Mohamed Ibn Chambas, H. E., and Akanmu G. Adebayo. Ghana Armed Forces in Lebanon and Liberia Peace Operations. Lexington Books, 2015. https://doi.org/10.5040/9781666993813.
Full textLebow, Richard Ned. Trust and International Relations. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190851163.003.0014.
Full textGowan, Richard. Ban Ki-moon, 2007–2016. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198748915.003.0009.
Full textKolodko, Grzegorz W. Quest for Development Success. Rowman & Littlefield, 2021. https://doi.org/10.5040/9781978732599.
Full textSnyder, Michael. James Purdy. Oxford University PressNew York, 2022. http://dx.doi.org/10.1093/oso/9780197609729.001.0001.
Full textJumet, Kira D., and Merouan Mekouar, eds. Doing Research as a Native. Oxford University PressNew York, 2025. https://doi.org/10.1093/oso/9780197699805.001.0001.
Full textKlosek, Jacqueline. Protecting Your Health Privacy. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216002314.
Full text