نتایج جستجو
Non-Traditional Security Issues in North Korea
Kyung-Ae Park, Min Sun Kim, 2013
Fuzzing for Software Security Testing and Quality Assurance
Ari Takanen, Jared D. Demott, 2008
The Eurasian Wheat Belt and Food Security: Global and Regional Aspects
Sergio Gomez y Paloma, Sébastien Mary, Stephen Langrell, Pavel Ciaian (eds.), 2017
Food Security and Sustainability: Investment and Financing along Agro-Food Chains
George Mergos, Marina Papanastassiou (eds.), 2017
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni (eds.), 2017
Advances in Network Systems : Architectures, Security, and Applications
Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski (eds.), 2017
Environmental Change and Human Security in Africa and the Middle East
Mohamed Behnassi, Katriona McGlade (eds.), 2017
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era
Richard Jiang, Somaya Al-maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi (eds.), 2017
The Water, Energy, and Food Security Nexus in the Arab Region
Kamel Amer, Zafar Adeel, Benno Böer, Walid Saleh (eds.), 2017
Swords into Market Shares: Technology, Security, and Economics in the New Russia
Glenn E. Schweitzer, 2000
Network Security Essentials: Applications and Standards
William Stallings, 1999
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Joshua Wright, Vincent Liu, 2010
America Inc.?: Innovation and Enterprise in the National Security State
Linda Weiss, 2014
Walling Out the Insiders. Controlling Access to Improve Organizational Security
Michael Erbschloe, 2017
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Jessey Bullock, Jeff T. Parker, 2017
Wireshark Network Security
Piyush Verma, 2015
Wireshark Network Security
Piyush Verma, 2015
Cyber warfare : techniques, tactics and tools for security practitioners
Jason Andress, 2011
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Ethics and Security in Canadian Foreign Policy
Rosalind Irwin, 2001
