نتایج جستجو
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins (auth.), 2013
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins, 2012
An Index and Other Useful Information
W. Beiglböck (auth.), H. Araki, J. Ehlers, K. Hepp, R. Kippenhahn, H. A. Weidenmüller, J. Zittartz, W. Beiglböck (eds.), 1985
Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
Chae Hoon Lim, Taekyoung Kwon (auth.), Peng Ning, Sihan Qing, Ninghui Li (eds.), 2006
Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
Thore Graepel, Kristin Lauter, Michael Naehrig (auth.), Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.), 2013
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings
Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.), 2004
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings
Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.), 2004
Information Computing and Applications: International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010. Proceedings, Part II
Taisheng Gong, Rui Fei, Jun Lai, Gaoyong Liang (auth.), Rongbo Zhu, Yanchun Zhang, Baoxiang Liu, Chunfeng Liu (eds.), 2010
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
Nonlinear Control Systems and Power System Dynamics (The International Series on Asian Studies in Computer and Information Science)
Qiang Lu, Yuanzhang Sun, Shengwei Mei, 2001
Knowledge Management and Information Tools for Building Maintenance and Facility Management
Cinzia Talamo, Marcella Bonanomi (auth.), 2015
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)
Lorrie Faith Cranor, Shane Greenstein, 2002
Advances in Multimedia Information Processing – PCM 2013: 14th Pacific-Rim Conference on Multimedia, Nanjing, China, December 13-16, 2013. Proceedings
Mohamed Osamnia, Arjulie John Berena (auth.), Benoit Huet, Chong-Wah Ngo, Jinhui Tang, Zhi-Hua Zhou, Alexander G. Hauptmann, Shuicheng Yan (eds.), 2013
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2011
Information modeling methods and methodologies
John Krogstie; TA Halpin; Keng Siau, 2005
Systems Analysis and Design: Techniques, Methodologies, Approaches, and Architectures (Advances in Management Information Systems)
Roger H. L. Chiang, Keng Siau, Bill C. Hardgrave, 2009
Advanced Information Systems Engineering: 22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010. Proceedings
Stefano Ceri, Marco Brambilla (auth.), Barbara Pernici (eds.), 2010
Automatic Tools for Designing Office Information Systems: The TODOS Approach
Barbara Pernici (auth.), Barbara Pernici, Colette Rolland (eds.), 1990
Mobile Information Systems
Elaine Lawrence, Barbara Pernici, John Krogstie, 2004
