نتایج جستجو
Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)
Virginia Koukouliou, Magdalena Ujevic, Otto Premstaller, 2009
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl (eds.), 2014
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings
Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings
Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings
Steve Barker (auth.), Vijay Atluri (eds.), 2008
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
David R. Miller, Michael Gregg, 2007
Security administrator street smarts: a real world guide to CompTIA Security+ skills
David R. Miller, Michael Gregg, 2007
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition
David R. Miller, Michael Gregg, 2011
Cooperating for Peace and Security: Evolving Institutions and Arrangements in a Context of Changing U.S. Security Policy
Bruce D. Jones, Shepard Forman, Richard Gowan (eds.), 2009
European Energy Security: Analysing the EU-Russia Energy Security Regime in Terms of Interdependence Theory
Dr. Nataliya Esakova (auth.), 2012
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin (eds.), 2007
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram (ed.), John Viega (ed.), 2009
