نتایج جستجو
Effective Security Management, Sixth Edition
Charles A. Sennewald CPP, 2015
Concurrency, Security, and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday
Thomas Gibson-Robinson, 2017
How to Cheat at Configuring Open Source Security Tools
Renaud Deraison, 2004
How to Cheat at Configuring Open Source Security Tools
Michael Gregg, 2007
98-367: MTA Security Fundamentals
coll., 2011
Network Security A Beginner’s Guide, Third Edition
Eric Maiwald, 2012
Management of Information Security
Michael E. Whitman, Herbert J. Mattord, 2013
Security in Computing
Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, 2015
Adapting to Climate Change: An Assessment of Vulnerability and Risks to Human Security in the Western Mediterranean Basin
Dania Abdul Malak, Katriona McGlade, Diana Pascual, Eduard Pla (auth.), 2017
Interoperability, Safety and Security in IoT: Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers
Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini (eds.), 2017
Information Security of Highly Critical Wireless Networks
Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson (auth.), 2017
Information Security and Cryptology – ICISC 2016: 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
Seokhie Hong, Jong Hwan Park (eds.), 2017
Information Systems Security and Privacy: Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers
Olivier Camp, Steven Furnell, Paolo Mori (eds.), 2017
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Kefei Chen, Dongdai Lin, Moti Yung (eds.), 2017
Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers
Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay (eds.), 2017
Security Einfach Machen: IT-Sicherheit als Sprungbrett für die Digitalisierung
Ferri Abolhassan (eds.), 2017
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI: Special Issue on Data and Security Engineering
Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (eds.), 2017
EU Gas Security Architecture: The Role of the Commission’s Entrepreneurship
Elina Brutschin (auth.), 2016
Rethinking Security in the Twenty-First Century: A Reader
Edwin Daniel Jacob (eds.), 2017
Security in the Persian Gulf Region
Fatemeh Shayan (auth.), 2017
The International Politics of the Armenian-Azerbaijani Conflict: The Original “Frozen Conflict” and European Security
Svante E. Cornell (eds.), 2017
War, Peace and International Security: From Sarajevo to Crimea
Jan Eichler (auth.), 2017
People, Risk, and Security: How to prevent your greatest asset from becoming your greatest liability
Lance Wright (auth.), 2017
Crime and Security: Managing the Risk to Safe Shopping
Adrian Beck, Andrew Willis (auth.), 2006
