نتایج جستجو
The Alarm, Sensor & Security Circuit Cookbook
Thomas Petruzzellis, 1993
The Alarm, Sensor & Security Circuit Cookbook
Thomas Petruzzellis, 1994
Formal Models and Techniques for Analyzing Security Protocols
Veronique Cortier, 2011
Internet and Intranet Security Management: Risks and Solutions
Lech Janczewski
Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security
Michael Savage, 2010
Your Money Ratios: 8 Simple Tools for Financial Security
Charles Farrell J.D. L.L.M., 2009
Firewall Design and Analysis (Computer and Network Security)
Alex X. Liu, 2010
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Security in Embedded Devices
Catherine H. Gebotys (auth.), 2010
Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
Thomas Feller (auth.), 2014
The Impact of Private Actors on Security Governance: An Analysis based on German ISR Capabilities for ISAF
Gloria Westermeyer (auth.), 2013
The Viability of Human Security
Monica den Boer, 2008
The Viability of Human Security
Monica den Boer, 2008
