نتایج جستجو
Biosecurity challenges of the global expansion of high-containment biological laboratories
Alison K Hottes; Ben Rusek; Frances Ellen Sharples; National Academy of Sciences (U.S.). Committee on International Security and Arms Control.; National Academy of Sciences (U.S.). Committee on Anticipating Biosecurity Challenges of the Global Expansion of High-Containment Biological Laboratories, 2012
Jonathan Dean: Pioneer in Détente in Europe, Global Cooperative Security, Arms Control and Disarmament
Hans Günter Brauch, Teri Grimwood (eds.), 2014
Postinternationalism and Small Arms Control : Theory, Politics, Security
Damien Rogers, 2009
State Control over Private Military and Security Companies in Armed Conflict
Hannah Tonkin, 2011
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
The Spent-Fuel Standard for Disposition of Excess Weapon Plutonium
Panel to Review the Spent-Fuel Standard for Disposition of Excess Weapon Plutonium, Committee on International Security and Arms Control, National Academy of Sciences, 2000
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings
José Ma Saldaña, José I. Aznar, Eduardo Viruete, Julián Fernández-Navajas, José Ruiz (auth.), Novella Bartolini, Sotiris Nikoletseas, Prasun Sinha, Valeria Cardellini, Anirban Mahanti (eds.), 2009
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)
Yan Zhang, Laurence T. Yang, Jiming Chen, 2009
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Cyber-War: The Anatomy of the global Security Threat
Julian Richards (auth.), 2014
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services, 2005
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
Vipin Swarup, Javier Thayer Fábrega (auth.), Jan Vitek, Christian D. Jensen (eds.), 1999
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings
Sjouke Mauw, Christian Damsgaard Jensen (eds.), 2014
Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Marcin Czenko, Jeroen Doumen, Sandro Etalle (auth.), Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen (eds.), 2008
Certification and Security in E-Services: From E-Government to E-Business
Maurizio Talamo (auth.), Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo (eds.), 2003
