نتایج جستجو
The Governance of Policing and Security: Ironies, Myths and Paradoxes
Bob Hoogenboom (auth.), 2010
The Politics of Private Security: Regulation, Reform and Re-Legitimation
Adam White (auth.), 2010
The Elusive Quest for European Security: From EDC to CFSP
Simon Duke (auth.), 2000
The New European Security Disorder
Simon Duke (auth.), 1994
Security Operations Management, Third Edition
Robert McCrie Professor, 2016
Intelligence and Security Informatics: Techniques and Applications
Bhavani Thuraisingham (auth.), 2008
Assessing Information Security Strategies Tactics Logic and Framework
Andrew Vladimirov, 2010
Biosensors for Security and Bioterrorism Applications
Dimitrios P. Nikolelis, 2016
Bioterrorism: mathematical modeling applications in homeland security
H. T. Banks, 1987
Bioterrorism: mathematical modeling applications in homeland security
H. T. Banks, 1987
Game Theoretic Risk Analysis of Security Threats
J.M.P Cardoso, 2009
Facility Manager's Guide To Security: Protecting Your Assets
Robert N. Reid, 2005
Facility Manager's Guide to Security: Protecting Your Assets
Robert N., 2005
Facility manager’s guide to security: protecting your assets
Robert N. Reid, 2005
Security and Privacy for Mobile Healthcare Networks
Kuan Zhang, 2015
Security for Multi-hop Wireless Networks
Mohamed M. E. A. Mahmoud, 2014
