نتایج جستجو
Managing Knowledge Security: Strategies for Protecting Your Company's Intellectual Assets
Kevin C. Desouza, 2007
Configuring Windows 2000 Server Security
Thomas W. Shinder, 2000
Configuring Windows 2000 Server security
Thomas W Shinder, 1999
Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks
M.D. Thomas W. Shinder, Debra Littlejohn Shinder, 2003
Foreign and Security Policy in the European Union
Professor Kjell A Eliassen, 1998
Handbook of research on information security and assurance
Jatinder N. D. Gupta, 2009
Managing Global Supply Chains: Compliance, Security, and Dealing with Terrorism
Thomas A. Cook, 2008
Formal Aspects of Security: First International Conference, FASec 2002, London, UK, December 16-18, 2002. Revised Papers
Fred B. Schneider (auth.), 2003
Modelling & Analysis of Security Protocols
Peter Ryan, 2000
Mission-critical security planner : when hackers won't take no for an answer
Eric Greenberg, 2003
