نتایج جستجو
Java Security (Java Series (O'Reilly & Associates).)
Scott Oaks, 1998
The Law of Security and Title-Based Financing
Hugh Beale, 2012
Bio-Inspired Innovation and National Security
Robert E. Armstrong, 2010
Maximum Wireless Security
Cyrus Peikari, 2002
Deleuze & Fascism: Security: War: Aesthetics
Brad Evans, 2015
Deleuze & Fascism: Security: War: Aesthetics
Brad Evans, 2015
Computer security literacy : staying safe in a digital world
Douglas Jacobson, 2013
Hardware-based computer security techniques to defeat hackers
Dube R.R., 2008
Introduction to Hardware Security and Trust
Junxia Ma, 2012
Introduction to Hardware Security and Trust
Junxia Ma, 2012
Security of Block Ciphers: From Algorithm Design to Hardware Implementation
Kazuo Sakiyama, 2015
Towards Hardware-Intrinsic Security: Foundations and Practice
Roel Maes, 2010
Breakdowns in Computer Security. Commentary and Analysis
Michael E Rentell, 1991
Energy Security: An Interdisciplinary Approach
Gawdat Bahgat(auth.), 2010
Soil Chemical Pollution, Risk Assessment, Remediation and Security
Hachadur Tchuldjian (auth.), 2008
Data & Computer Security: Dictionary of standards concepts and terms
Dennis Longley, 1989
