نتایج جستجو
Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security
John Mueller, Mark G. Stewart, 2011
Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.), 2012
Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings
Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi (auth.), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (eds.), 1998
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.), 2013
Physical and logical security convergence: powered by enterprise security management
Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole, 2007
Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems
Michael Khairallah, 2005
Physical-layer security : from information theory to security engineering
Matthieu Bloch; Joao Barros, 2011
Physical-Layer Security: From Information Theory to Security Engineering
Matthieu Bloch, João Barros, 2011
Physical-Layer Security: From Information Theory to Security Engineering
Matthieu Bloch, João Barros, 2011
Security Risk Assessment: Managing Physical and Operational Security
John M. White, 2014
Asian Security Handbook: Terrorism And The New Security Environment
William M. Carpenter, David G. Wiencek, James R. Lilley, 2005
Asian Security Handbook: Terrorism And The New Security Environment (East Gate Book)
James R. Lilley, William M. Carpenter, David G. Wiencek, 2005
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2015
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
Rayne Reid, Johan Van Niekerk (auth.), Ronald C. Dodge Jr., Lynn Futcher (eds.), 2013
