نتایج جستجو
Cloud computing security: foundations and challenges
John R. Vacca, 2017
Soft targets and crisis management: what emergency planners and security professionals need to know
Fagel, Michael J.; Hesterman, Jennifer L, 2017
Perspectives on complex global challenges : education, energy, healthcare, security and resilience
Paté-Cornell, Marie Elisabeth; Rouse, William B.; Vest, Charles M, 2016
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Gene Kim, Jez Humble, Patrick Debois, John Willis, 2016
Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach
Chung-Wei Lin, Alberto Sangiovanni Vincentelli, 2017
Network Security Assessment: Know Your Network
Chris McNab, 2016
Physical Security. 150 Things You Should Know
Lawrence Fennelly, Marianna Perry, 2016
Practical Paranoia Android 5 Security Essentials
Marc L. Mintz, 2015
British Intelligence in the Second World War: Volume 4, Security and Counter-Intelligence
F. H. Hinsley, C. A. G. Simkins, 1990
The European Community and the Security Dilemma, 1979–92
Holly Wyatt-Walter (auth.), 1997
First World Hunger: Food Security and Welfare Politics
Graham Riches (eds.), 1997
Common Security and Strategic Reform: A Critical Analysis
Andrew Butfoy (auth.), 1997
The New Security Agenda in the Asia-Pacific Region
Denny Roy (eds.), 1997
Security Politics in the Commonwealth of Independent States: The Southern Belt
Mehdi Mozaffari (eds.), 1997
The Politics of Threat: Minuteman Vulnerability in American National Security Policy
David H. Dunn (auth.), 1997
European Security
Wilfried von Bredow, Thomas Jäger, Gerhard Kümmel (eds.), 1997
NATO and the Quest for Post-Cold War Security
Clay Clemens (eds.), 1997
NATO and Collective Security
Michael Brenner (eds.), 1998
Beyond UN Subcontracting: Task-Sharing with Regional Security Arrangements and Service-Providing NGOs
Thomas G. Weiss (eds.), 1998
The New South Africa: Prospects for Domestic and International Security
F. H. Toase, E. J. Yorke (eds.), 1998
Managing Risk and Information Security: Protect to Enable
Malcolm W. Harkins (auth.), 2016
