نتایج جستجو
Security, Territory, Population: Lectures at the College De France, 1977–78
Michel Senellart, François Ewald, Alessandro Fontana (eds.), 2009
Security Strategies in the Asia-Pacific: The United States’ “Second Front” in Southeast Asia
Andrew T. H. Tan (auth.), 2011
The Dynamics Of European Security Cooperation, 1945–91
Gülnur Aybet (auth.), 1997
Expanding the Zone of Peace?: Democratization and International Security
Alexander V. Kozhemiakin (auth.), 1998
National Security under the Obama Administration
Bahram M. Rajaee, Mark J. Miller (eds.), 2012
Economic Instruments of Security Policy: Influencing Choices of Leaders
Gary M. Shiffman, James J. Jochum (auth.), 2011
Subjects of Security: Domestic Effects of Foreign Policy in the War on Terror
Robin Cameron (auth.), 2013
Macroeconomic Variables and Security Prices in India during the Liberalized Period
Tarak Nath Sahu (auth.), 2015
U.S. Foreign Policy and European Security
Arthur Cyr (auth.), 1987
Third-World Conflict and International Security
Christoph Bertram (eds.), 1982
Public Opinion and National Security in Western Europe: Consensus Lost?
Richard C. Eichenberg (auth.), 1989
Politics and Security in the Southern Region of the Atlantic Alliance
Douglas T. Stuart (eds.), 1988
Artificial Intelligence and National Security
Greg Allen; Taniel Chan, 2017
Police Encounters: Security and Surveillance in Gaza under Egyptian Rule
Ilana Feldman, 2015
Guideline for a healthy information system: strengthen information system security in 42 measures
Agence nationale de la sécurité des systèmes d’information, 2017
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
CCNA Security (210-260) Portable Command Guide
Bob Vachon, 2016
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology
Nicholas J. Daras, Themistocles M. Rassias(eds.), 2017
Oracle Database 12c Security
Scott Gaetjen, David Knox, William Maroulis, 2015
Mobile Security and Privacy: Advances, Challenges and Future Research Directions
Man Ho Au, Raymond Choo, 2016
