نتایج جستجو
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns
Eduardo Fernandez-Buglioni, 2013
Distributed systems security : issues, processes, and solutions
Abhijit Belapurkar, 2009
The Perils of Proximity: China-japan Security Relations
Richard C. Bush, 2010
The Risk Pivot: Great Powers, International Security, and the Energy Revolution
Bruce D. Jones, 2014
Security and Privacy for Microsoft Office 2010 Users
Mitch Tulloch, 2012
Security and Privacy for Microsoft Office 2010 Users
Mitch Tulloch, 2012
Economic Dimensions of Security in Central Asia
Sergej Mahnovski, 2006
Biotechnology, Security and the Search for Limits: An Inquiry into Research and Methods
Brian Rappert (auth.), 2007
Transactions on Data Hiding and Multimedia Security II
André Adelsbach, 2007
Transactions on Data Hiding and Multimedia Security IV
Angela Piper, 2009
Transactions on Data Hiding and Multimedia Security IV
Angela Piper, 2009
Transactions on Data Hiding and Multimedia Security IV
Angela Piper, 2009
Transactions on Data Hiding and Multimedia Security X
Yun Q. Shi (eds.), 2015
Security in Network Coding
Peng Zhang, 2016
Trade, the WTO and Energy Security: Mapping the Linkages for India
Sajal Mathur (eds.), 2014
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
