نتایج جستجو
Statistical Methods in Computer Security (Statistics: A Series of Textbooks and Monographs)
William W.S. Chen, 2005
Software Deployment, Updating, and Patching (Information Security)
Bill Stackpole, 2007
Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments
Eric N. Smith (Auth.), 2014
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich, 2013
Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People
Organisation for Economic Co-Operation, 2003
Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)
Blanca Jimenez Cisneros, 2009
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Angelos D. Keromytis (auth.), 2011
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Angelos D. Keromytis (auth.), 2011
Cargo Crime: Security and Theft Prevention
John J Coughlin, 2012
From Police to Security Professional : a Guide to a Successful Career Transition
Michael S D"Angelo, 2015
The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network
Ibrahim AL-MARASHI, 2003
Network Security Auditing
Chris Jackson, 2009
Defending the U.S. Air Transportation System Against Chemical and Biological Threats
Committee on Assessment of Security Technologies for Transportation, 2006
Defending the U.S. Air Transportation System Against Chemical and Biological Threats
Committee on Assessment of Security Technologies for Transportation, 2006
Improving Web Application Security: Threats and Countermeasures
Microsoft Corporation, 2003
Software Systems Reliability and Security
M. Broy, 2007
