نتایج جستجو
Computation, Cryptography, and Network Security
Nicholas J. Daras, 2015
Security Protocols: 8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers
Roger Needham (auth.), 2001
Remote Sensing from Space: Supporting International Peace and Security
Clementine Burnley, 2009
Handbook of information security,
Hossein Bidgoli, 2006
Handbook of information security,
Hossein Bidgoli, 2006
Handbook of information security,
Hossein Bidgoli, 2006
Calling for Security and Justice In Nepal: Citzens' Perspectives on the Rule of Law and the Role of the Nepal Police
United States Institutes of Peace, 2011
Communications and Multimedia Security: Volume 3
Sokratis Katsikas (eds.), 1997
Introduction to Security and Network Forensics
Buchanan, 2011
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Roger Needham (auth.), 2000
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Roger Needham (auth.), 2000
Security Protocols: 8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers
Roger Needham (auth.), 2001
Security Protocols: 9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers
Roger Needham (auth.), 2002
Security Protocols: 9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers
Roger Needham (auth.), 2002
Top Secret America: The Rise of the New American Security State
Dana Priest, 2011
