نتایج جستجو
Handbook of FPGA Design Security
Ted Huffmire, 2010
Handbook of FPGA Design Security
Ted Huffmire, 2010
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
L. Torres (auth.), 2011
Distributed Systems Security: Issues, Processes and Solutions
Abhijit Belapurkar, 2009
Biological Weapons: Limiting the Threat (BCSIA Studies in International Security)
Joshua Lederberg, 1999
Botnet Detection: Countering the Largest Security Threat
W. Timothy Strayer, 2008
Botnet Detection: Countering the Largest Security Threat
Wenke Lee, 2008
Cell Phones. Threats to Privacy and Security
Patricia D. Netzley, 2014
Chinese Perceptions of Traditional and Nontraditional Security Threats
Susan L. Craig, 2007
Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual World
Derek S. Reveron (ed.), 2012
Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries
Daniel J. Benny, 2012
IT-Security 2005: Sicherheit und Datenschutz beim IT-Outsourcing
PD Dr. Burkhard Pedell (auth.), 2004
Web Security Basics
Shweta Bhasin, 2002
Homeland Security
Matt Mullins, 2009
Conflict Management for Security Professionals
Andrew A. Tufano (Auth.), 2014
Conflict Management for Security Professionals
Andrew A. Tufano, 2013
Geopolitical Change, Grand Strategy and European Security: The EU-NATO Conundrum in Perspective
Luis Simón (auth.), 2013
The Central Intelligence Agency: Security under Scrutiny (Understanding Our Government)
Richard Immerman, 2005
The Central Intelligence Agency: Security under Scrutiny (Understanding Our Government)
Richard Immerman, 2005
The Oxford Handbook of National Security Intelligence
Loch K. Johnson, 2010
Building a Home Security System with Raspberry Pi
Matthew Poole, 2015
