نتایج جستجو
Internet and Intranet Security Management: Risks and Solutions
Lech Janczewski
Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security
Michael Savage, 2010
Your Money Ratios: 8 Simple Tools for Financial Security
Charles Farrell J.D. L.L.M., 2009
Firewall Design and Analysis (Computer and Network Security)
Alex X. Liu, 2010
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Security in Embedded Devices
Catherine H. Gebotys (auth.), 2010
Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
Thomas Feller (auth.), 2014
The Impact of Private Actors on Security Governance: An Analysis based on German ISR Capabilities for ISAF
Gloria Westermeyer (auth.), 2013
The Viability of Human Security
Monica den Boer, 2008
The Viability of Human Security
Monica den Boer, 2008
The Viability of Human Security
Monica Den Boer &, 2008
Identity and Data Security for Web Development: Best Practices
Jonathan LeBlanc, 2016
National Security Issues in Science, Law, and Technology: Confronting Weapons of Terrorism
Thomas A. Johnson, 2007
Group Policy Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2013
