نتایج جستجو
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's guide to web application security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.), 2014
Java Security Solutions
Rich Helton, Johennie Helton, 2002
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
Building Global Security Through Cooperation: Annals of Pugwash 1989
Richard Garwin (auth.), Professor Dr. Joseph Rotblat, Professor John P. Holdren (eds.), 1990
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang, 2010
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang (auth.), 2010
Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)
Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
Wen-Chung Kuo (auth.), Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.), 2009
Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.), 2015
Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991
Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E
Ido Dubrawsky, 2009
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E
Ido Dubrawsky, Jeremy Faircloth, 2009
Eleventh Hour Security+: Exam SY0-201 Study Guide
Ido Dubrawsky, 2009
Security+
Ido Dubrawsky (Auth.), 2007
Environmental Security and Public Safety: Problems and Needs in Conversion Policy and Research after 15 Years of Conversion in Central and Eastern Europe
Alexander Döring Dipl. Eng. (auth.), Wolfgang Spyra, Michael Katzsch (eds.), 2007
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
