نتایج جستجو
Handbook of Image-based Security Techniques
Agarwal, Suneeta; Shivani, Shivendra; Suri, Jasjit S, 2018
Handbook of Image-Based Security Techniques
Shivendra Shivani; Suneeta Agarwal; Jasjit S Suri, 2018
Oil Exploration, Diplomacy, and Security in the Early Cold War: The Enemy underground
Roberto Cantoni, 2017
CANSO Cyber Security and Risk Assessment Guide
coll., 2014
Computer Security: Principles and Practice
Stallings, William; Brown, Lawrie, 2018
Security in Computing
Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, 2105
Computer security: Principles and Practice
William Stallings, Lawrie Brown, 2015
Brown Threat: Identification in the Security State
Kumarini Silva, 2016
Artificial intelligence safety and security
Yampolskiy, Roman V., 2018
The Complete Cyber Security Course - Volume 1
Nathan House
Fail-Safe Investing: Lifelong Financial Security in 30 Minutes
Harry Browne, 1999
Settlement, Market and Food Security
OECD, 2013
Spring Security
Robert Winch Mick Knutson Peter Mularien, 2017
Defining Value Based Information Security Governance
Sushma Mishra, 1995
The Routledge Companion to Risk, Crisis and Security in Business
Engemann, Kurt J., 2018
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
Wm. Arthur Conklin; Gregory White, 2017
String Analysis for Software Verification and Security
Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin, 2017
Introduction to Homeland Security
Keith G. Logan, James D. Ramsay, 2012
CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition
David L. Prowse, 2015
Information Security and IT Risk Management
Manish Agrawal, Alex Campoe, Eric Pierce
