نتایج جستجو
Dynamic Secrets in Communication Security
Sheng Xiao, 2014
Security Access in Wireless Local Area Networks: From Architecture and Protocols to Realization
Prof. Jianfeng Ma, 2009
Java Security
Harpreet Sethi
Nortel Guide to VPN Routing for Security and VoIP
James Edwards, 2006
The Doctrines of US Security Policy: An Evaluation under International Law
Heiko Meiertons, 2010
HP Non: Stop Server Security. A Practical Handbook
Terri Hill, 2004
HP NonStop Server Security: A Practical Handbook
XYPRO Technology Corp, 2003
The United States, China and Southeast Asian Security: A Changing of the Guard?
Wayne Bert (auth.), 2003
The Unlawful Society: Global Crime and Security in a Complex World
Paul Battersby (auth.), 2014
The Transnational Governance of Violence and Crime: Non-State Actors in Security
Anja P. Jakobi, 2013
Professional ASP.NET 2.0 Security, Membership, and Role Management
Stefan Schackow, 2006
Applied Network Security Monitoring. Collection, Detection, and Analysis
Chris Sanders, 2014
WiMAX Security and Quality of Service: An End-to-End Perspective
Seok-Yee Tang, 2010
WiMAX Security and Quality of Service: An End-to-End Perspective
Seok-Yee Tang, 2010
The Quest for a European Strategic Culture: Changing Norms on Security and Defence in the European Union
Christoph O. Meyer (auth.), 2006
ISSE 2009 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2009 Conference
Vittorio Bertocci (auth.), 2010
