نتایج جستجو
International Law, US Power: The United States' Quest for Legal Security
Dr Shirley V. Scott, 2012
International Law, US Power: The United States' Quest for Legal Security
Shirley V. Scott, 2012
International Intellectual Property Law and Human Security
Robin Ramcharan (auth.), 2013
Java Security
Scott Oaks, 2001
Java Security (Java Series (O'Reilly & Associates).)
Scott Oaks, 1998
The Law of Security and Title-Based Financing
Hugh Beale, 2012
Bio-Inspired Innovation and National Security
Robert E. Armstrong, 2010
Maximum Wireless Security
Cyrus Peikari, 2002
Deleuze & Fascism: Security: War: Aesthetics
Brad Evans, 2015
Deleuze & Fascism: Security: War: Aesthetics
Brad Evans, 2015
Computer security literacy : staying safe in a digital world
Douglas Jacobson, 2013
Hardware-based computer security techniques to defeat hackers
Dube R.R., 2008
Introduction to Hardware Security and Trust
Junxia Ma, 2012
Introduction to Hardware Security and Trust
Junxia Ma, 2012
Security of Block Ciphers: From Algorithm Design to Hardware Implementation
Kazuo Sakiyama, 2015
Towards Hardware-Intrinsic Security: Foundations and Practice
Roel Maes, 2010
Breakdowns in Computer Security. Commentary and Analysis
Michael E Rentell, 1991
Energy Security: An Interdisciplinary Approach
Gawdat Bahgat(auth.), 2010
