نتایج جستجو
Inside Internet Security: What Hackers Don't Want You To Know
Jeff Crume, 2000
Managing Critical Infrastructure Risks: Decision Tools and Applications for Port Security
Richard J. Wenning, 2007
The Nexus: International Terrorism and Drug Trafficking from Afghanistan (Praeger Security International)
Frank C. Shanty Ph.D., 2011
Providing for National Security: A Comparative Analysis
Andrew Dorman, 2014
Security and Safety in Los Angeles High Rise Building After 9 11
Rae Archibald, 2002
Introduction to Information Security. A Strategic-Based Approach
Timothy Shimeall, 2014
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon, 2016
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures
Keijo Haataja, 2013
Securing the API Stronghold: The Ultimate Guide to API Security
Travis Spencer, 2015
Security Strategy: From Requirements to Reality
Bill Stackpole, 2010
Transforming settler states: communal conflict and internal security in Northern Ireland and Zimbabwe
Ronald John Weitzer, 1990
Security, Territory, Population: Lectures at the Collège de France 1977--1978
Michel Foucault, 2009
The Trouble with Terror: Liberty, Security and the Response to Terrorism
Tamar Meisels, 2008
The Trouble with Terror: Liberty, Security and the Response to Terrorism
Tamar Meisels, 2008
