نتایج جستجو
Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
William J. Caelli (auth.), Ed Dawson, Duncan S. Wong (eds.), 2007
Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
Jiazhe Chen, Keting Jia (auth.), Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang (eds.), 2010
Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
Jiazhe Chen, Keting Jia (auth.), Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang (eds.), 2010
The Avid handbook : advanced techniques, strategies, and survival information for Avid editing systems
Greg Staten, Steve Bayes, 2009
The Avid handbook: advanced techniques, strategies, and survival information for Avid editing systems
Greg Staten, Steve Bayes, 2008
The Avid Handbook: Advanced Techniques, Strategies, and Survival Information for Avid Editing Systems, 5th Edition
Greg Staten, Steve Bayes, 2008
Hacking secrets revealed. Information and instructional guide
S&C Enterprises
Hacking the IT Cube: The Information Technology Department Survival Guide
Douglas Chick, 2006
Advances in Neural Information Processing Systems 7
Gerald Tesauro, David S. Touretzky, Todd K. Leen (Editors), 1995
Honeypots: A New Paradigm to Information Security
R. C. Joshi, Anjali Sardana, 2011
Collaborative Construction Information Management
Geoffrey Shen, Peter Brandon, Andrew Baldwin, 2009
Collaborative Construction Information Management (Spon Research)
Geoffrey Shen, 2009
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES)
Charles A. Shoniregun (auth.), 2005
Information Security Risk Analysis
Thomas R. Peltier, 2005
Information Security Risk Analysis
Thomas R. Peltier, 2001
Information Security Risk Analysis
Thomas R. Peltier, 2010
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information security risk management
Daniel Minoli; Jake Kouns
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010
Sebastian Klipper (auth.), 2011
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010
Sebastian Klipper (auth.), 2015
