نتایج جستجو
Chasing Dragons: Security, Identity, and Illicit Drugs in Canada
Kyle Grayson, 2008
Applied Network Security: Proven tactics to detect and defend against all kinds of network attack
Arthur Salmon, Warun Levesque, Michael McLafferty, 2017
Machine Learning and Security: Protecting Systems with Data and Algorithms
Clarence Chio; David Freeman, 2018
Hardware IP Security and Trust
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, 2017
Untangle Network Security
Abd El-Monem A. El-Bawab, 2014
Practical Internet of Things Security
Brian Russell, Drew Van Duren, 2016
Microsoft Azure Security
Roberto Freato, 2015
OpenStack Cloud Security
Fabio Alessandro Locati, 2015
Practical Linux Security Cookbook
Tajinder Kalsi, 2016
Enterprise Mac Security: Mac OS X
Charles S. Edge, Daniel O’Donnell, 2015
Vmware Vcloud Security
Prasenjit Sarkar, 2013
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
CCSP(ISC)2 Certified Cloud Security Professional Official Study Guide
O’Hara, Ben Malisow, 2017
Militarizing the Environment: Climate Change and the Security State
Robert P. Marzec, 2015
CCSP Certified Cloud Security Professional All-in-One Exam Guide
Daniel Carter, 2016
Cloud Security Automation
Prashant Priyam, 2018
Ccsp Certified Cloud Security Professional All-In-One Exam Guide
Daniel Carter, 2016
Security of Bangladesh
Md. Shariful Islam, 2016
Role of UN Security Council in Contemporary World Politics
Md. Shariful Islam, 2018
Maritime Security of Bangladesh
Delwar Hossain and Md. Shariful Islam, 2016
Digital Logic Design and Computer Organization with Computer Architecture for Security
Nikrouz Faroughi, 2014
Psychology of a Superpower: Security and Dominance in U.S. Foreign Policy
Christopher Fettweis, 2018
Food Security Threat: Factors, Policies and Challenges
Jonathan Webb, 2017
