نتایج جستجو
Kali Linux: Assuring Security By Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Kali Linux: Assuring Security by Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Black Hat Physical Device Security
Drew Miller, 2004
Black Hat physical device security: exploiting hardware and software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Effective Physical Security
Lawrence Fennelly (Eds.), 2012
Effective Physical Security, Third Edition
Lawrence Fennelly, 2003
Effective Physical Security. Design, Equipment, and Operations
Lawrence J. Fennelly (Eds.), 1992
Military Handbook Design Guidelines for Physical Security of Facilities
DEPARTMENT OF DEFENSE WASHINGTON DC, 1993
Physical and Data-Link Security Techniques for Future Communication Systems
Marco Baldi, Stefano Tomasin (eds.), 2016
Physical Layer Security in Wireless Communications
Xiangyun Zhou, Lingyang Song, Yan Zhang, 2013
Physical Security and Environmental Protection
John Perdikaris, 2014
Physical Security and Safety: A Field Guide for the Practitioner
Truett A Ricks; Bobby E Ricks; Jeffrey Dingle, 2014
Physical Security for IT
Michael Erbschloe, 2005
Physical Security Guidelines. Template
Bob Hayes (Eds.), 2013
Physical-Layer Security for Cooperative Relay Networks
Yulong Zou, Jia Zhu (auth.), 2016
Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers
Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, Costas Lambrinoudakis (eds.), 2016
The Complete Guide to Physical Security
Paul R. Baker, Daniel J. Benny, 2012
The Science and Technology of Counterterrorism. Measuring Physical and Electronic Security Risk
Carl Young (Auth.), 2015
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Wil Allsopp, 2009
