نتایج جستجو
Terrorism and Homeland Security: Thinking Strategically About Policy
Paul Viotti, 2008
Supply Chain Security: A Comprehensive Approach
Arthur G. Arway, 2013
Statistical Methods in Computer Security
William W.S. Chen, 2004
Statistical Methods in Computer Security (Statistics: A Series of Textbooks and Monographs)
William W.S. Chen, 2005
Software Deployment, Updating, and Patching (Information Security)
Bill Stackpole, 2007
Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments
Eric N. Smith (Auth.), 2014
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich, 2013
Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People
Organisation for Economic Co-Operation, 2003
Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)
Blanca Jimenez Cisneros, 2009
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Angelos D. Keromytis (auth.), 2011
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Angelos D. Keromytis (auth.), 2011
Cargo Crime: Security and Theft Prevention
John J Coughlin, 2012
From Police to Security Professional : a Guide to a Successful Career Transition
Michael S D"Angelo, 2015
