نتایج جستجو
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)
Ari Takanen, Jared DeMott, Charlie Miller, 2008
Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)
Ari Takanen, Jared DeMott, Charlie Miller, 2008
Air Pollution Modeling and its Application XIX (NATO Science for Peace and Security Series C: Environmental Security)
Carlos Borrego, Ana Isabel Miranda, 2008
Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security)
Douw G. Steyn, S. T. Rao, 2010
Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings
Michael Roland, Josef Langer, Josef Scharinger (auth.), Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.), 2012
Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop
Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko, 2005
Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)
Kenneth A. Rogers and Marvin G. Kingsley, 2007
Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada
Sushil Jajodia, Duminda Wijesekera (auth.), Martin S. Olivier, David L. Spooner (eds.), 2002
Database and Applications Security: Integrating Information Security and Data Management
Bhavani Thuraisingham, 2005
Mergers and Acquisitions Security: Corporate Restructuring and Security Management
Edward Halibozek MBA, Gerald L. Kovacich CFECPPCISSP, 2005
Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)
Michael Vinay Bhatia, Mark Sedra, 2008
Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure
Eric D. Knapp and Raj Samani (Auth.), 2013
Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)
Adnan Ibrahimbegovic, Muhamed Zlatar, 2009
