نتایج جستجو
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Bruce Christianson (auth.), 2011
Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
Bruce Christianson (auth.), 2013
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, 2013
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, 2013
Computer Security Within Organizations
Adrian R. Warman (auth.), 1993
The Routledge Handbook of Security Studies(Routledge Handbooks)
Victor Mauer (Editor), 2010
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2013
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2013
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2015
Security for Telecommunications Networks
Patrick Traynor, 2008
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
Susan Landau, 2011
Encyclopedia of Information Ethics and Security
Marian Quigley, 2007
Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Hamid R. Nemati, 2008
Why Leaders Choose War: The Psychology of Prevention (Praeger Security International)
Jonathan Renshon, 2006
Making Liberia Safe: Transformation of the National Security Sector
David C. Gompert, 2007
