نتایج جستجو
Safety and Security Equipment and Services in Turkey: A Strategic Reference, 2007
Philip M. Parker, 2007
Complete Book of Remote Access: Connectivity and Security
Victor Kasacavage, 2002
Nanoscience Advances in CBRN Agents Detection, Information and Energy Security
Plamen Petkov, 2015
Software for automation : Architecture, integration, and security
Jonas Berge, 2005
Java 2 network security
Marco Pistoia, 1999
Cyber Security Essentials
James Graham, 2011
Practical Vo: IP Security
Thomas Porter, Jan Kanclirz, Andy Zmolek, Antonio Rosela, Michael Cross, Larry Chaffin, Brian Baskin, 2006
Guide to tactical perimeter defense: becoming a security network specialist
Randy Weaver, 2008
Financial Statement Analysis and Security Valuation 4ed
Stephan H. Penman, 2009
Cryptography and Data Security
Dorothy Elizabeth Robling Denning, 1982
Four Views on Eternal Security
J. Matthew Pinson, 2002
Handbook of Research on Wireless Security
Yan Zhang, 2008
Handbook of Research on Wireless Security
Yan Zhang, 2008
Intelligence and National Security: A Reference Handbook
John Ransom Clark, 2007
Agile IT Security Implementation Methodology
Jeff Laskowski, 2011
Agile IT Security Implementation Methodology
Jeff Laskowski, 2011
New European Security Disorder
Simon Duke, 1994
The elusive quest for European security: from EDC to CFSP
Simon Duke, 2000
